{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","type":"deb","namespace":"debian","name":"mysql-8.0","version":"8.0.33-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.34-1","latest_non_vulnerable_version":"8.0.46-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78496?format=json","vulnerability_id":"VCID-294p-669y-myd8","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21962","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33457","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21962"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188125","reference_id":"2188125","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188125"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21962"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-294p-669y-myd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78018?format=json","vulnerability_id":"VCID-379y-9g2h-ukhm","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22104","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07613","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07595","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07511","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07536","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0855","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08328","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08375","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0847","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22104"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245028","reference_id":"2245028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245028"},{"reference_url":"https://security.netapp.com/advisory/ntap-20231027-0009/","reference_id":"ntap-20231027-0009","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T15:54:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20231027-0009/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-22104"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-379y-9g2h-ukhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78490?format=json","vulnerability_id":"VCID-3hz9-teg3-3ubj","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21940.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21940","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33457","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21940"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188119","reference_id":"2188119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188119"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21940"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hz9-teg3-3ubj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78501?format=json","vulnerability_id":"VCID-5yqx-aj43-7fer","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21977","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15653","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15699","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15655","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15525","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15705","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.1585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15829","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15722","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1823","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.1833","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21977"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188130","reference_id":"2188130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188130"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21977"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yqx-aj43-7fer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78500?format=json","vulnerability_id":"VCID-78yc-ncfs-jyd8","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21976","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15058","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14999","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14934","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17392","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.1749","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188129","reference_id":"2188129","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188129"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21976"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-78yc-ncfs-jyd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78487?format=json","vulnerability_id":"VCID-7ft5-5uaa-mqea","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21929.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21929","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33873","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3376","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33905","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33758","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33373","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33182","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36474","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36448","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21929"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188116","reference_id":"2188116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188116"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21929"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ft5-5uaa-mqea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78488?format=json","vulnerability_id":"VCID-7jwt-xtch-y3g7","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21933.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21933","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33457","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21933"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188117","reference_id":"2188117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188117"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21933"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jwt-xtch-y3g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78486?format=json","vulnerability_id":"VCID-7nff-sauv-ekfw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21920.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21920","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30072","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33106","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21920"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188115","reference_id":"2188115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188115"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21920"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7nff-sauv-ekfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78489?format=json","vulnerability_id":"VCID-bg4z-h1ya-bkg9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21935.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21935","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33457","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21935"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188118","reference_id":"2188118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188118"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21935"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bg4z-h1ya-bkg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78498?format=json","vulnerability_id":"VCID-dp3v-716h-cbep","summary":"mysql: Server: JSON unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21966","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12826","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12782","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12601","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12611","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12581","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12489","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12697","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15002","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1491","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21966"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188127","reference_id":"2188127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188127"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21966"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dp3v-716h-cbep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78503?format=json","vulnerability_id":"VCID-ds2a-wbbd-7fev","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21982","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12784","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15259","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1536","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21982"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188132","reference_id":"2188132","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188132"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21982"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ds2a-wbbd-7fev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78492?format=json","vulnerability_id":"VCID-fgud-y4d2-ekhu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21946.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21946","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44303","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44355","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44035","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48568","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48543","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21946"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188121","reference_id":"2188121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188121"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21946"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fgud-y4d2-ekhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78495?format=json","vulnerability_id":"VCID-hgnv-zdsm-wuaz","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21955.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21955","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33457","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21955"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188124","reference_id":"2188124","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188124"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21955"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hgnv-zdsm-wuaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78491?format=json","vulnerability_id":"VCID-khzk-mgcw-3ff6","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21945.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21945","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3093","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30921","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30907","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3069","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.31054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33498","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33457","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21945"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188120","reference_id":"2188120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188120"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21945"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khzk-mgcw-3ff6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78494?format=json","vulnerability_id":"VCID-mydc-k3wq-bkc2","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21953","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30072","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33106","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21953"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188123","reference_id":"2188123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188123"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:06Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21953"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mydc-k3wq-bkc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78493?format=json","vulnerability_id":"VCID-ngqt-qntm-hugw","summary":"mysql: Server: Components Services unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21947","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30072","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21947"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188122","reference_id":"2188122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188122"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:39:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21947"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ngqt-qntm-hugw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78481?format=json","vulnerability_id":"VCID-prbq-dh9s-bqas","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21911","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30072","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21911"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188109","reference_id":"2188109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21911"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-prbq-dh9s-bqas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78502?format=json","vulnerability_id":"VCID-vwms-568k-gfe1","summary":"mysql: Client programs unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21980.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21980","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59091","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5915","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59135","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59115","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59134","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.5912","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59079","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59078","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.62986","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00435","scoring_system":"epss","scoring_elements":"0.63039","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21980"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188131","reference_id":"2188131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188131"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-16T14:25:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"},{"reference_url":"https://usn.ubuntu.com/6060-2/","reference_id":"USN-6060-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21980"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwms-568k-gfe1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78499?format=json","vulnerability_id":"VCID-xs7y-us9k-kycg","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21972","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13037","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13005","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12784","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15259","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1536","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21972"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188128","reference_id":"2188128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188128"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21972"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xs7y-us9k-kycg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78485?format=json","vulnerability_id":"VCID-z4a8-r35u-kqdn","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21919.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21919","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30698","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30657","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.3062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30072","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33145","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21919"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719","reference_id":"1034719","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188113","reference_id":"2188113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188113"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/","reference_id":"C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/","reference_id":"JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/","reference_id":"QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T15:14:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931416?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.33-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2023-21919"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z4a8-r35u-kqdn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.33-1%3Fdistro=sid"}