{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","type":"deb","namespace":"debian","name":"mysql-8.0","version":"8.0.32-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.33-1","latest_non_vulnerable_version":"8.0.46-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78743?format=json","vulnerability_id":"VCID-1jm9-vjfe-skgu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21870","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21870"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162277","reference_id":"2162277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21870"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jm9-vjfe-skgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78755?format=json","vulnerability_id":"VCID-22uu-xxpk-37av","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21882","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23789","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21882"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162289","reference_id":"2162289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21882"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22uu-xxpk-37av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78497?format=json","vulnerability_id":"VCID-2aa4-79kv-ruge","summary":"mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21963","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21031","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21362","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21313","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21963"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188126","reference_id":"2188126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188126"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21963"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2aa4-79kv-ruge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78741?format=json","vulnerability_id":"VCID-4cc4-gy7g-8kb9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21868","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32141","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3265","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3248","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21868"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162275","reference_id":"2162275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21868"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4cc4-gy7g-8kb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78748?format=json","vulnerability_id":"VCID-859e-runv-4qah","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21875","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38837","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38553","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21875"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162282","reference_id":"2162282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21875"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-859e-runv-4qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78746?format=json","vulnerability_id":"VCID-8x1f-u547-tqb3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21873","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21873"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162280","reference_id":"2162280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21873"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x1f-u547-tqb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78751?format=json","vulnerability_id":"VCID-9x3z-66pg-13c9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21878","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3189","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32095","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21878"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162285","reference_id":"2162285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21878"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9x3z-66pg-13c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78749?format=json","vulnerability_id":"VCID-athx-ebka-d3h9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21876","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32517","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21876"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162283","reference_id":"2162283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21876"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-athx-ebka-d3h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78736?format=json","vulnerability_id":"VCID-b72z-7wpc-7uhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21863","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21863"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162270","reference_id":"2162270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21863"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b72z-7wpc-7uhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78742?format=json","vulnerability_id":"VCID-cba4-wgmt-67h8","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21869","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26604","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26823","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21869"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162276","reference_id":"2162276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21869"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cba4-wgmt-67h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78740?format=json","vulnerability_id":"VCID-chj1-f5ha-4bfu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21867","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21867"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162274","reference_id":"2162274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21867"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chj1-f5ha-4bfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78744?format=json","vulnerability_id":"VCID-dudq-65hd-kfek","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21871","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21871"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162278","reference_id":"2162278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21871"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dudq-65hd-kfek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78002?format=json","vulnerability_id":"VCID-fyah-c7dc-93gn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22026","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34292","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34228","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33775","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33753","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35571","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245012","reference_id":"2245012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22026"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyah-c7dc-93gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78757?format=json","vulnerability_id":"VCID-gf4v-xpef-8ygu","summary":"mysql: Server: GIS unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21887","reference_id":"","reference_type":"","scores":[{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.9777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97806","published_at":"2026-05-05T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97802","published_at":"2026-04-29T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97797","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162291","reference_id":"2162291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21887"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gf4v-xpef-8ygu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78752?format=json","vulnerability_id":"VCID-h13j-2a9m-xfbk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21879","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32517","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32654","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21879"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162286","reference_id":"2162286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21879"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h13j-2a9m-xfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78754?format=json","vulnerability_id":"VCID-hpqm-5m4j-q3cx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21881","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27766","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27159","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27328","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162288","reference_id":"2162288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21881"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hpqm-5m4j-q3cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78483?format=json","vulnerability_id":"VCID-jyys-fjmd-cbhw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21913","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39201","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63016","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188111","reference_id":"2188111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188111"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21913"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyys-fjmd-cbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78734?format=json","vulnerability_id":"VCID-muua-g6dy-6ub1","summary":"mysql: Server: DML unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21836","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3209","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3243","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162268","reference_id":"2162268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21836"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-muua-g6dy-6ub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78753?format=json","vulnerability_id":"VCID-rna4-zqrp-77fr","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21880","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26443","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26646","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26711","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26654","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162287","reference_id":"2162287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21880"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rna4-zqrp-77fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78750?format=json","vulnerability_id":"VCID-wg76-asva-3qce","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21877","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3235","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21877"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162284","reference_id":"2162284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21877"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wg76-asva-3qce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78756?format=json","vulnerability_id":"VCID-wuf9-tbh8-ffat","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21883","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26336","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26566","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26518","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26398","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21883"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162290","reference_id":"2162290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21883"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wuf9-tbh8-ffat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78003?format=json","vulnerability_id":"VCID-yur8-xgu4-pqbc","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22028","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30064","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33089","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32973","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245013","reference_id":"2245013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6583-1/","reference_id":"USN-6583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6583-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22028"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yur8-xgu4-pqbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78001?format=json","vulnerability_id":"VCID-zc2d-3ejk-g7b9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22015","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3405","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35339","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22015"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245011","reference_id":"2245011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931415?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.32-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22015"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc2d-3ejk-g7b9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.32-1%3Fdistro=sid"}