{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","type":"deb","namespace":"debian","name":"mysql-8.0","version":"8.0.36-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"8.0.37-1","latest_non_vulnerable_version":"8.0.46-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77829?format=json","vulnerability_id":"VCID-1df8-99y1-z3b1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20973.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20973","reference_id":"","reference_type":"","scores":[{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4301","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43258","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43346","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43298","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.4336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00209","scoring_system":"epss","scoring_elements":"0.43349","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20973"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258784","reference_id":"2258784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258784"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T20:36:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20973"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1df8-99y1-z3b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77834?format=json","vulnerability_id":"VCID-3tkk-bpmr-yygk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20978.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20978","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44039","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20978"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258789","reference_id":"2258789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20978"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3tkk-bpmr-yygk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77838?format=json","vulnerability_id":"VCID-75us-ex8b-9bea","summary":"mysql: Server : Security : Firewall unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20984","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48383","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48513","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48465","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4852","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48538","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48523","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48573","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48526","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258793","reference_id":"2258793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20984"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75us-ex8b-9bea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77828?format=json","vulnerability_id":"VCID-8wy6-axhs-a7b9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20972.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20972","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44039","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20972"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258783","reference_id":"2258783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20972"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8wy6-axhs-a7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77821?format=json","vulnerability_id":"VCID-9mcw-ujzr-g7a4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20965.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20965","reference_id":"","reference_type":"","scores":[{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66674","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66699","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66619","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66639","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66652","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66659","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00515","scoring_system":"epss","scoring_elements":"0.66627","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20965"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258776","reference_id":"2258776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258776"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0006/","reference_id":"ntap-20240201-0006","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T14:48:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20965"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9mcw-ujzr-g7a4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74821?format=json","vulnerability_id":"VCID-a3fa-dj6h-3bdg","summary":"mysql: Optimizer unspecified vulnerability (CPU Jul 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21137.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21137","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33778","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.33899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34383","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34455","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34457","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34418","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34394","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34429","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34416","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34374","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34003","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21137"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298321","reference_id":"2298321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2298321"},{"reference_url":"https://www.oracle.com/security-alerts/cpujul2024.html","reference_id":"cpujul2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T14:29:30Z/"}],"url":"https://www.oracle.com/security-alerts/cpujul2024.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21137"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3fa-dj6h-3bdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77827?format=json","vulnerability_id":"VCID-ab1w-d1qc-3yaa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20971","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36785","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37243","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37314","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37296","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20971"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258782","reference_id":"2258782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258782"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:46:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20971"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ab1w-d1qc-3yaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77839?format=json","vulnerability_id":"VCID-cbw5-wtpg-4qh4","summary":"mysql: Server: UDF unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20985","reference_id":"","reference_type":"","scores":[{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70546","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70513","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70563","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70572","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.7045","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70428","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70488","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70512","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70483","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70526","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00638","scoring_system":"epss","scoring_elements":"0.70534","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20985"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258794","reference_id":"2258794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258794"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T21:46:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20985"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbw5-wtpg-4qh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77816?format=json","vulnerability_id":"VCID-f1km-fnbx-hqba","summary":"mysql: Server: RAPID unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20960.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20960","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51174","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51211","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51251","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.5123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51216","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51254","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51261","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51186","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20960"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258771","reference_id":"2258771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20960"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f1km-fnbx-hqba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77818?format=json","vulnerability_id":"VCID-f6xm-t4e5-mkfv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20962.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20962","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55399","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55454","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20962"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258773","reference_id":"2258773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20962"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6xm-t4e5-mkfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77830?format=json","vulnerability_id":"VCID-g57b-67q4-1bf3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20974.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20974","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17238","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17141","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17033","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16968","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16912","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20974"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258785","reference_id":"2258785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20974"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g57b-67q4-1bf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76846?format=json","vulnerability_id":"VCID-hfza-ubb9-gbea","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20993.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20993","reference_id":"","reference_type":"","scores":[{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35267","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35734","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35469","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35383","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35874","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35735","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35785","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35808","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35816","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35794","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35783","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20993"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275428","reference_id":"2275428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275428"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0014/","reference_id":"ntap-20240426-0014","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-17T18:08:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20993"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hfza-ubb9-gbea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77826?format=json","vulnerability_id":"VCID-hudn-9xy8-kudb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20970.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20970","reference_id":"","reference_type":"","scores":[{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48487","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48611","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48597","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4862","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48572","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48626","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48613","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4867","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48627","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20970"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258781","reference_id":"2258781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20970"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hudn-9xy8-kudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76861?format=json","vulnerability_id":"VCID-hyn3-nyeu-8bdw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21055","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32332","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3282","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32671","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32822","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32869","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32862","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32878","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32856","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21055"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275444","reference_id":"2275444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275444"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0011/","reference_id":"ntap-20240426-0011","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-07T13:51:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21055"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hyn3-nyeu-8bdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76865?format=json","vulnerability_id":"VCID-j5dm-qp9g-uygv","summary":"mysql: Server: Audit Plug-in unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21061","reference_id":"","reference_type":"","scores":[{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35677","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36142","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35912","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35879","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35792","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36323","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3623","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36209","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36194","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21061"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275448","reference_id":"2275448","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275448"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.2.0_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240426-0014/","reference_id":"ntap-20240426-0014","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-13T20:40:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240426-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21061"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j5dm-qp9g-uygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77822?format=json","vulnerability_id":"VCID-jhke-e5qv-dua9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20966.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20966","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44039","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20966"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258777","reference_id":"2258777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20966"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jhke-e5qv-dua9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77833?format=json","vulnerability_id":"VCID-knap-u7y6-duhy","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20977.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20977","reference_id":"","reference_type":"","scores":[{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47551","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47682","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47637","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.4764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47695","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47714","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47701","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47756","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20977"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258788","reference_id":"2258788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258788"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T15:39:04Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20977"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knap-u7y6-duhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77817?format=json","vulnerability_id":"VCID-r7r8-ucgm-judb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20961.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20961","reference_id":"","reference_type":"","scores":[{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64597","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6459","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64624","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64621","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.6456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64518","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64599","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64587","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0047","scoring_system":"epss","scoring_elements":"0.64604","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20961"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258772","reference_id":"2258772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258772"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:53:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20961"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r7r8-ucgm-judb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77819?format=json","vulnerability_id":"VCID-sm6e-jgke-g7cb","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20963.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20963","reference_id":"","reference_type":"","scores":[{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60798","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60775","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60768","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60817","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60833","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60822","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60864","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00402","scoring_system":"epss","scoring_elements":"0.60869","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20963"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258774","reference_id":"2258774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258774"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20963"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sm6e-jgke-g7cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76863?format=json","vulnerability_id":"VCID-tn1d-ppx8-23ea","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21057.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21057","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.29973","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.3057","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30605","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30564","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30524","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30488","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30308","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21057"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275446","reference_id":"2275446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2275446"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2024.html","reference_id":"cpuapr2024.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T16:11:19Z/"}],"url":"https://www.oracle.com/security-alerts/cpuapr2024.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21057"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tn1d-ppx8-23ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77825?format=json","vulnerability_id":"VCID-ttph-u92a-z3cx","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20969.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20969","reference_id":"","reference_type":"","scores":[{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32295","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32779","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32629","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.3278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00133","scoring_system":"epss","scoring_elements":"0.32814","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20969"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258780","reference_id":"2258780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258780"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-01T19:54:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20969"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ttph-u92a-z3cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77823?format=json","vulnerability_id":"VCID-tv8p-rmhf-1ucm","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20967.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20967","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19031","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19192","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19181","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19565","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19283","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19413","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19418","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19284","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20967"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258778","reference_id":"2258778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258778"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T15:54:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20967"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tv8p-rmhf-1ucm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77832?format=json","vulnerability_id":"VCID-u2pn-bks7-syhq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20976.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20976","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44039","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44372","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44365","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44382","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44396","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44325","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44238","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20976"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258787","reference_id":"2258787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20976"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u2pn-bks7-syhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77836?format=json","vulnerability_id":"VCID-ucd7-7329-7qdm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20982","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40003","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40223","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40141","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40427","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40428","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40439","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4046","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40419","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40344","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40235","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20982"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258791","reference_id":"2258791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20982"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucd7-7329-7qdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77820?format=json","vulnerability_id":"VCID-wvmj-yphj-2ybt","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20964.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20964","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55399","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55448","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55512","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5553","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55454","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20964"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258775","reference_id":"2258775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258775"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20964"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvmj-yphj-2ybt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77835?format=json","vulnerability_id":"VCID-x695-8ykr-cffs","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jan 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-20981.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20981","reference_id":"","reference_type":"","scores":[{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36785","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37243","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37426","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37317","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37329","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37314","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37296","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-20981"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126","reference_id":"1061126","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061126"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258790","reference_id":"2258790","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2258790"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240201-0003/","reference_id":"ntap-20240201-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-17T16:56:05Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240201-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2619","reference_id":"RHSA-2024:2619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2619"},{"reference_url":"https://usn.ubuntu.com/6615-1/","reference_id":"USN-6615-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6615-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-20981"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x695-8ykr-cffs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73650?format=json","vulnerability_id":"VCID-y4ku-kd73-h3fe","summary":"mysql: Optimizer unspecified vulnerability (CPU Oct 2024)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21200.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21200","reference_id":"","reference_type":"","scores":[{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36562","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36679","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37216","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37047","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37111","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37121","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.3706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.37031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36797","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-21200"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318875","reference_id":"2318875","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2318875"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql_server:8.0.35_and_prior:*:*:*:*:*:*:*"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0894","reference_id":"RHSA-2024:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:1141","reference_id":"RHSA-2024:1141","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:1141"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/931419?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.36-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/931406?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.45-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.45-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076094?format=json","purl":"pkg:deb/debian/mysql-8.0@8.0.46-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.46-1%3Fdistro=sid"}],"aliases":["CVE-2024-21200"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y4ku-kd73-h3fe"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-8.0@8.0.36-1%3Fdistro=sid"}