Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/mysql@8.0.32-1?arch=el9_2
Typerpm
Namespaceredhat
Namemysql
Version8.0.32-1
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1jm9-vjfe-skgu
vulnerability_id VCID-1jm9-vjfe-skgu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21870
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26793
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26378
published_at 2026-05-07T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26441
published_at 2026-04-29T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26309
published_at 2026-05-05T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26834
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26685
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26735
published_at 2026-04-09T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-12T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26638
published_at 2026-04-13T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26645
published_at 2026-04-16T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.26617
published_at 2026-04-18T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26578
published_at 2026-04-21T12:55:00Z
14
value 0.00096
scoring_system epss
scoring_elements 0.2652
published_at 2026-04-24T12:55:00Z
15
value 0.00096
scoring_system epss
scoring_elements 0.26513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21870
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162277
reference_id 2162277
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162277
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21870
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jm9-vjfe-skgu
1
url VCID-22uu-xxpk-37av
vulnerability_id VCID-22uu-xxpk-37av
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21882
reference_id
reference_type
scores
0
value 0.00082
scoring_system epss
scoring_elements 0.24129
published_at 2026-04-02T12:55:00Z
1
value 0.00082
scoring_system epss
scoring_elements 0.23751
published_at 2026-05-07T12:55:00Z
2
value 0.00082
scoring_system epss
scoring_elements 0.23789
published_at 2026-04-29T12:55:00Z
3
value 0.00082
scoring_system epss
scoring_elements 0.23666
published_at 2026-05-05T12:55:00Z
4
value 0.00082
scoring_system epss
scoring_elements 0.24167
published_at 2026-04-04T12:55:00Z
5
value 0.00082
scoring_system epss
scoring_elements 0.23953
published_at 2026-04-07T12:55:00Z
6
value 0.00082
scoring_system epss
scoring_elements 0.2402
published_at 2026-04-08T12:55:00Z
7
value 0.00082
scoring_system epss
scoring_elements 0.24066
published_at 2026-04-09T12:55:00Z
8
value 0.00082
scoring_system epss
scoring_elements 0.24084
published_at 2026-04-11T12:55:00Z
9
value 0.00082
scoring_system epss
scoring_elements 0.2404
published_at 2026-04-12T12:55:00Z
10
value 0.00082
scoring_system epss
scoring_elements 0.23983
published_at 2026-04-13T12:55:00Z
11
value 0.00082
scoring_system epss
scoring_elements 0.23994
published_at 2026-04-16T12:55:00Z
12
value 0.00082
scoring_system epss
scoring_elements 0.23981
published_at 2026-04-18T12:55:00Z
13
value 0.00082
scoring_system epss
scoring_elements 0.23963
published_at 2026-04-21T12:55:00Z
14
value 0.00082
scoring_system epss
scoring_elements 0.23841
published_at 2026-04-24T12:55:00Z
15
value 0.00082
scoring_system epss
scoring_elements 0.2383
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21882
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162289
reference_id 2162289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162289
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21882
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-22uu-xxpk-37av
2
url VCID-2aa4-79kv-ruge
vulnerability_id VCID-2aa4-79kv-ruge
summary mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21963
reference_id
reference_type
scores
0
value 0.00069
scoring_system epss
scoring_elements 0.21446
published_at 2026-04-02T12:55:00Z
1
value 0.00069
scoring_system epss
scoring_elements 0.21402
published_at 2026-04-11T12:55:00Z
2
value 0.00069
scoring_system epss
scoring_elements 0.21288
published_at 2026-04-21T12:55:00Z
3
value 0.00069
scoring_system epss
scoring_elements 0.21154
published_at 2026-04-24T12:55:00Z
4
value 0.00069
scoring_system epss
scoring_elements 0.21157
published_at 2026-04-26T12:55:00Z
5
value 0.00069
scoring_system epss
scoring_elements 0.21132
published_at 2026-04-29T12:55:00Z
6
value 0.00069
scoring_system epss
scoring_elements 0.21031
published_at 2026-05-05T12:55:00Z
7
value 0.00069
scoring_system epss
scoring_elements 0.215
published_at 2026-04-04T12:55:00Z
8
value 0.00069
scoring_system epss
scoring_elements 0.21252
published_at 2026-04-07T12:55:00Z
9
value 0.00069
scoring_system epss
scoring_elements 0.21332
published_at 2026-04-08T12:55:00Z
10
value 0.00069
scoring_system epss
scoring_elements 0.21393
published_at 2026-04-09T12:55:00Z
11
value 0.00069
scoring_system epss
scoring_elements 0.21362
published_at 2026-04-12T12:55:00Z
12
value 0.00069
scoring_system epss
scoring_elements 0.21309
published_at 2026-04-13T12:55:00Z
13
value 0.00069
scoring_system epss
scoring_elements 0.21304
published_at 2026-04-16T12:55:00Z
14
value 0.00069
scoring_system epss
scoring_elements 0.21313
published_at 2026-04-18T12:55:00Z
15
value 0.00095
scoring_system epss
scoring_elements 0.26136
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21963
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188126
reference_id 2188126
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188126
3
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 2.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:51Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
aliases CVE-2023-21963
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2aa4-79kv-ruge
3
url VCID-2fsg-vrnf-n7ff
vulnerability_id VCID-2fsg-vrnf-n7ff
summary mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json
reference_id
reference_type
scores
0
value 2.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21874
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15696
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15534
published_at 2026-05-07T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15543
published_at 2026-04-29T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15414
published_at 2026-05-05T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15759
published_at 2026-04-04T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15563
published_at 2026-04-07T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15649
published_at 2026-04-08T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15706
published_at 2026-04-09T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15673
published_at 2026-04-11T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15638
published_at 2026-04-12T12:55:00Z
10
value 0.0005
scoring_system epss
scoring_elements 0.15574
published_at 2026-04-13T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.155
published_at 2026-04-16T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15508
published_at 2026-04-18T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.1556
published_at 2026-04-21T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21874
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162281
reference_id 2162281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162281
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
aliases CVE-2023-21874
risk_score 1.2
exploitability 0.5
weighted_severity 2.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsg-vrnf-n7ff
4
url VCID-2pmu-2dwp-mba2
vulnerability_id VCID-2pmu-2dwp-mba2
summary mysql: Server: Replication unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21633
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21867
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21513
published_at 2026-05-07T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21733
published_at 2026-04-13T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21734
published_at 2026-04-16T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-18T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21707
published_at 2026-04-21T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-24T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21553
published_at 2026-04-26T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21543
published_at 2026-04-29T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21447
published_at 2026-05-05T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.2192
published_at 2026-04-04T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21685
published_at 2026-04-07T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.21763
published_at 2026-04-08T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2182
published_at 2026-04-09T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.2183
published_at 2026-04-11T12:55:00Z
15
value 0.00071
scoring_system epss
scoring_elements 0.21791
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21633
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142873
reference_id 2142873
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142873
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21633
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pmu-2dwp-mba2
5
url VCID-39xf-9may-73az
vulnerability_id VCID-39xf-9may-73az
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21594
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21594
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142861
reference_id 2142861
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142861
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21594
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-39xf-9may-73az
6
url VCID-4cc4-gy7g-8kb9
vulnerability_id VCID-4cc4-gy7g-8kb9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21868
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32782
published_at 2026-04-02T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32205
published_at 2026-05-07T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32281
published_at 2026-04-29T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32141
published_at 2026-05-05T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32818
published_at 2026-04-04T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32639
published_at 2026-04-07T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32687
published_at 2026-04-08T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32713
published_at 2026-04-09T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32715
published_at 2026-04-11T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32678
published_at 2026-04-12T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.3265
published_at 2026-04-13T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-16T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32664
published_at 2026-04-18T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.32634
published_at 2026-04-21T12:55:00Z
14
value 0.00131
scoring_system epss
scoring_elements 0.3248
published_at 2026-04-24T12:55:00Z
15
value 0.00131
scoring_system epss
scoring_elements 0.32364
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21868
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162275
reference_id 2162275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162275
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21868
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4cc4-gy7g-8kb9
7
url VCID-81qz-dkfs-wkan
vulnerability_id VCID-81qz-dkfs-wkan
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39400
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39400
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142879
reference_id 2142879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142879
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-39400
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-81qz-dkfs-wkan
8
url VCID-859e-runv-4qah
vulnerability_id VCID-859e-runv-4qah
summary mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21875
reference_id
reference_type
scores
0
value 0.00174
scoring_system epss
scoring_elements 0.38817
published_at 2026-04-02T12:55:00Z
1
value 0.00174
scoring_system epss
scoring_elements 0.38393
published_at 2026-05-07T12:55:00Z
2
value 0.00174
scoring_system epss
scoring_elements 0.38441
published_at 2026-04-29T12:55:00Z
3
value 0.00174
scoring_system epss
scoring_elements 0.38322
published_at 2026-05-05T12:55:00Z
4
value 0.00174
scoring_system epss
scoring_elements 0.38837
published_at 2026-04-04T12:55:00Z
5
value 0.00174
scoring_system epss
scoring_elements 0.38766
published_at 2026-04-07T12:55:00Z
6
value 0.00174
scoring_system epss
scoring_elements 0.38815
published_at 2026-04-08T12:55:00Z
7
value 0.00174
scoring_system epss
scoring_elements 0.38826
published_at 2026-04-09T12:55:00Z
8
value 0.00174
scoring_system epss
scoring_elements 0.38839
published_at 2026-04-11T12:55:00Z
9
value 0.00174
scoring_system epss
scoring_elements 0.38802
published_at 2026-04-12T12:55:00Z
10
value 0.00174
scoring_system epss
scoring_elements 0.38775
published_at 2026-04-13T12:55:00Z
11
value 0.00174
scoring_system epss
scoring_elements 0.3882
published_at 2026-04-16T12:55:00Z
12
value 0.00174
scoring_system epss
scoring_elements 0.38798
published_at 2026-04-18T12:55:00Z
13
value 0.00174
scoring_system epss
scoring_elements 0.38718
published_at 2026-04-21T12:55:00Z
14
value 0.00174
scoring_system epss
scoring_elements 0.38553
published_at 2026-04-24T12:55:00Z
15
value 0.00174
scoring_system epss
scoring_elements 0.38528
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21875
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162282
reference_id 2162282
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162282
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21875
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-859e-runv-4qah
9
url VCID-8x1f-u547-tqb3
vulnerability_id VCID-8x1f-u547-tqb3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21873
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26143
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25773
published_at 2026-05-07T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25821
published_at 2026-04-29T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25714
published_at 2026-05-05T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-04T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.25955
published_at 2026-04-07T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26022
published_at 2026-04-08T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26073
published_at 2026-04-09T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26083
published_at 2026-04-11T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26038
published_at 2026-04-12T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25979
published_at 2026-04-13T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-16T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-18T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25933
published_at 2026-04-21T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-24T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21873
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162280
reference_id 2162280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162280
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21873
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8x1f-u547-tqb3
10
url VCID-9x3z-66pg-13c9
vulnerability_id VCID-9x3z-66pg-13c9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21878
reference_id
reference_type
scores
0
value 0.00129
scoring_system epss
scoring_elements 0.32411
published_at 2026-04-02T12:55:00Z
1
value 0.00129
scoring_system epss
scoring_elements 0.31815
published_at 2026-05-07T12:55:00Z
2
value 0.00129
scoring_system epss
scoring_elements 0.3189
published_at 2026-04-29T12:55:00Z
3
value 0.00129
scoring_system epss
scoring_elements 0.31742
published_at 2026-05-05T12:55:00Z
4
value 0.00129
scoring_system epss
scoring_elements 0.32447
published_at 2026-04-04T12:55:00Z
5
value 0.00129
scoring_system epss
scoring_elements 0.32273
published_at 2026-04-07T12:55:00Z
6
value 0.00129
scoring_system epss
scoring_elements 0.32322
published_at 2026-04-08T12:55:00Z
7
value 0.00129
scoring_system epss
scoring_elements 0.32351
published_at 2026-04-09T12:55:00Z
8
value 0.00129
scoring_system epss
scoring_elements 0.32352
published_at 2026-04-11T12:55:00Z
9
value 0.00129
scoring_system epss
scoring_elements 0.32314
published_at 2026-04-12T12:55:00Z
10
value 0.00129
scoring_system epss
scoring_elements 0.32286
published_at 2026-04-13T12:55:00Z
11
value 0.00129
scoring_system epss
scoring_elements 0.32323
published_at 2026-04-16T12:55:00Z
12
value 0.00129
scoring_system epss
scoring_elements 0.32299
published_at 2026-04-18T12:55:00Z
13
value 0.00129
scoring_system epss
scoring_elements 0.3227
published_at 2026-04-21T12:55:00Z
14
value 0.00129
scoring_system epss
scoring_elements 0.32095
published_at 2026-04-24T12:55:00Z
15
value 0.00129
scoring_system epss
scoring_elements 0.31971
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21878
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162285
reference_id 2162285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162285
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21878
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9x3z-66pg-13c9
11
url VCID-a91v-ghah-17cp
vulnerability_id VCID-a91v-ghah-17cp
summary mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21599
reference_id
reference_type
scores
0
value 0.00066
scoring_system epss
scoring_elements 0.20197
published_at 2026-04-26T12:55:00Z
1
value 0.00066
scoring_system epss
scoring_elements 0.20163
published_at 2026-04-29T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20583
published_at 2026-05-07T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20512
published_at 2026-05-05T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21734
published_at 2026-04-16T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21867
published_at 2026-04-02T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-24T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21707
published_at 2026-04-21T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.2174
published_at 2026-04-18T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.2192
published_at 2026-04-04T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21685
published_at 2026-04-07T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21763
published_at 2026-04-08T12:55:00Z
12
value 0.00071
scoring_system epss
scoring_elements 0.2182
published_at 2026-04-09T12:55:00Z
13
value 0.00071
scoring_system epss
scoring_elements 0.2183
published_at 2026-04-11T12:55:00Z
14
value 0.00071
scoring_system epss
scoring_elements 0.21791
published_at 2026-04-12T12:55:00Z
15
value 0.00071
scoring_system epss
scoring_elements 0.21733
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21599
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142863
reference_id 2142863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142863
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21599
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a91v-ghah-17cp
12
url VCID-aq75-zern-cfc1
vulnerability_id VCID-aq75-zern-cfc1
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21611
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06886
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.07164
published_at 2026-05-07T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06993
published_at 2026-04-13T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.06932
published_at 2026-04-16T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.06915
published_at 2026-04-18T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07051
published_at 2026-04-21T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07034
published_at 2026-04-24T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.07038
published_at 2026-04-26T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06999
published_at 2026-04-29T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.07017
published_at 2026-05-05T12:55:00Z
10
value 0.00025
scoring_system epss
scoring_elements 0.06935
published_at 2026-04-04T12:55:00Z
11
value 0.00025
scoring_system epss
scoring_elements 0.06919
published_at 2026-04-07T12:55:00Z
12
value 0.00025
scoring_system epss
scoring_elements 0.06974
published_at 2026-04-08T12:55:00Z
13
value 0.00025
scoring_system epss
scoring_elements 0.07006
published_at 2026-04-09T12:55:00Z
14
value 0.00025
scoring_system epss
scoring_elements 0.0701
published_at 2026-04-11T12:55:00Z
15
value 0.00025
scoring_system epss
scoring_elements 0.07
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21611
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142869
reference_id 2142869
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142869
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21611
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aq75-zern-cfc1
13
url VCID-athx-ebka-d3h9
vulnerability_id VCID-athx-ebka-d3h9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21876
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33138
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.3258
published_at 2026-05-07T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32654
published_at 2026-04-29T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32517
published_at 2026-05-05T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-04T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33
published_at 2026-04-07T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33045
published_at 2026-04-08T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33075
published_at 2026-04-09T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33077
published_at 2026-04-11T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33039
published_at 2026-04-12T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33015
published_at 2026-04-13T12:55:00Z
11
value 0.00134
scoring_system epss
scoring_elements 0.33057
published_at 2026-04-16T12:55:00Z
12
value 0.00134
scoring_system epss
scoring_elements 0.33034
published_at 2026-04-18T12:55:00Z
13
value 0.00134
scoring_system epss
scoring_elements 0.32998
published_at 2026-04-21T12:55:00Z
14
value 0.00134
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-24T12:55:00Z
15
value 0.00134
scoring_system epss
scoring_elements 0.32738
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21876
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162283
reference_id 2162283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162283
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21876
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-athx-ebka-d3h9
14
url VCID-b243-p5y2-f3gp
vulnerability_id VCID-b243-p5y2-f3gp
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21608
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25983
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25629
published_at 2026-05-07T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25832
published_at 2026-04-13T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-16T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-18T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25787
published_at 2026-04-21T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25732
published_at 2026-04-24T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25724
published_at 2026-04-26T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25677
published_at 2026-04-29T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25563
published_at 2026-05-05T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.26025
published_at 2026-04-04T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25796
published_at 2026-04-07T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.25867
published_at 2026-04-08T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-09T12:55:00Z
14
value 0.00092
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-11T12:55:00Z
15
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21608
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142868
reference_id 2142868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142868
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
11
reference_url https://usn.ubuntu.com/5696-2/
reference_id USN-5696-2
reference_type
scores
url https://usn.ubuntu.com/5696-2/
fixed_packages
aliases CVE-2022-21608
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b243-p5y2-f3gp
15
url VCID-b72z-7wpc-7uhk
vulnerability_id VCID-b72z-7wpc-7uhk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21863
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26143
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25773
published_at 2026-05-07T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25821
published_at 2026-04-29T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25714
published_at 2026-05-05T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-04T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.25955
published_at 2026-04-07T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26022
published_at 2026-04-08T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26073
published_at 2026-04-09T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26083
published_at 2026-04-11T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26038
published_at 2026-04-12T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25979
published_at 2026-04-13T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-16T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-18T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25933
published_at 2026-04-21T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-24T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21863
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162270
reference_id 2162270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162270
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21863
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b72z-7wpc-7uhk
16
url VCID-brdf-qg3q-7yc2
vulnerability_id VCID-brdf-qg3q-7yc2
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39410
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37518
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.36969
published_at 2026-05-07T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37385
published_at 2026-04-13T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37431
published_at 2026-04-16T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37413
published_at 2026-04-18T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37357
published_at 2026-04-21T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37138
published_at 2026-04-24T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37107
published_at 2026-04-26T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.3702
published_at 2026-04-29T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.36902
published_at 2026-05-05T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37542
published_at 2026-04-04T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-07T12:55:00Z
12
value 0.00164
scoring_system epss
scoring_elements 0.37422
published_at 2026-04-08T12:55:00Z
13
value 0.00164
scoring_system epss
scoring_elements 0.37434
published_at 2026-04-09T12:55:00Z
14
value 0.00164
scoring_system epss
scoring_elements 0.37447
published_at 2026-04-11T12:55:00Z
15
value 0.00164
scoring_system epss
scoring_elements 0.37412
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39410
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142881
reference_id 2142881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142881
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-39410
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-brdf-qg3q-7yc2
17
url VCID-cba4-wgmt-67h8
vulnerability_id VCID-cba4-wgmt-67h8
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21869
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.2708
published_at 2026-04-02T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.26672
published_at 2026-05-07T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26749
published_at 2026-04-29T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26604
published_at 2026-05-05T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27117
published_at 2026-04-04T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.26906
published_at 2026-04-07T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.26975
published_at 2026-04-08T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.2702
published_at 2026-04-09T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27024
published_at 2026-04-11T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.26979
published_at 2026-04-12T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26923
published_at 2026-04-13T12:55:00Z
11
value 0.00098
scoring_system epss
scoring_elements 0.26932
published_at 2026-04-16T12:55:00Z
12
value 0.00098
scoring_system epss
scoring_elements 0.26907
published_at 2026-04-18T12:55:00Z
13
value 0.00098
scoring_system epss
scoring_elements 0.26872
published_at 2026-04-21T12:55:00Z
14
value 0.00098
scoring_system epss
scoring_elements 0.26823
published_at 2026-04-24T12:55:00Z
15
value 0.00098
scoring_system epss
scoring_elements 0.26815
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21869
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162276
reference_id 2162276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162276
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21869
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cba4-wgmt-67h8
18
url VCID-chj1-f5ha-4bfu
vulnerability_id VCID-chj1-f5ha-4bfu
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21867
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26793
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26378
published_at 2026-05-07T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26441
published_at 2026-04-29T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26309
published_at 2026-05-05T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26834
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26685
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26735
published_at 2026-04-09T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-12T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26638
published_at 2026-04-13T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26645
published_at 2026-04-16T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.26617
published_at 2026-04-18T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26578
published_at 2026-04-21T12:55:00Z
14
value 0.00096
scoring_system epss
scoring_elements 0.2652
published_at 2026-04-24T12:55:00Z
15
value 0.00096
scoring_system epss
scoring_elements 0.26513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21867
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162274
reference_id 2162274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162274
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21867
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-chj1-f5ha-4bfu
19
url VCID-d9d6-kt1p-17ej
vulnerability_id VCID-d9d6-kt1p-17ej
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21917
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36352
published_at 2026-04-02T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36296
published_at 2026-04-11T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36211
published_at 2026-04-21T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.3598
published_at 2026-04-24T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.35947
published_at 2026-04-26T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.35859
published_at 2026-04-29T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.35742
published_at 2026-05-05T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36385
published_at 2026-04-04T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.36219
published_at 2026-04-07T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.36269
published_at 2026-04-08T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.36291
published_at 2026-04-09T12:55:00Z
11
value 0.00155
scoring_system epss
scoring_elements 0.3626
published_at 2026-04-12T12:55:00Z
12
value 0.00155
scoring_system epss
scoring_elements 0.36235
published_at 2026-04-13T12:55:00Z
13
value 0.00155
scoring_system epss
scoring_elements 0.36279
published_at 2026-04-16T12:55:00Z
14
value 0.00155
scoring_system epss
scoring_elements 0.36263
published_at 2026-04-18T12:55:00Z
15
value 0.0018
scoring_system epss
scoring_elements 0.39214
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21917
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188112
reference_id 2188112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188112
3
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:35Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
aliases CVE-2023-21917
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9d6-kt1p-17ej
20
url VCID-dkss-szpz-cfdh
vulnerability_id VCID-dkss-szpz-cfdh
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21864
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26143
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25773
published_at 2026-05-07T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25821
published_at 2026-04-29T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25714
published_at 2026-05-05T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-04T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.25955
published_at 2026-04-07T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26022
published_at 2026-04-08T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26073
published_at 2026-04-09T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26083
published_at 2026-04-11T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26038
published_at 2026-04-12T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25979
published_at 2026-04-13T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-16T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-18T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25933
published_at 2026-04-21T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-24T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21864
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162271
reference_id 2162271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162271
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
aliases CVE-2023-21864
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkss-szpz-cfdh
21
url VCID-dudq-65hd-kfek
vulnerability_id VCID-dudq-65hd-kfek
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21871
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26143
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25773
published_at 2026-05-07T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.25821
published_at 2026-04-29T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25714
published_at 2026-05-05T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-04T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.25955
published_at 2026-04-07T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26022
published_at 2026-04-08T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26073
published_at 2026-04-09T12:55:00Z
8
value 0.00093
scoring_system epss
scoring_elements 0.26083
published_at 2026-04-11T12:55:00Z
9
value 0.00093
scoring_system epss
scoring_elements 0.26038
published_at 2026-04-12T12:55:00Z
10
value 0.00093
scoring_system epss
scoring_elements 0.25979
published_at 2026-04-13T12:55:00Z
11
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-16T12:55:00Z
12
value 0.00093
scoring_system epss
scoring_elements 0.25964
published_at 2026-04-18T12:55:00Z
13
value 0.00093
scoring_system epss
scoring_elements 0.25933
published_at 2026-04-21T12:55:00Z
14
value 0.00093
scoring_system epss
scoring_elements 0.25872
published_at 2026-04-24T12:55:00Z
15
value 0.00093
scoring_system epss
scoring_elements 0.25868
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21871
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162278
reference_id 2162278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162278
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21871
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dudq-65hd-kfek
22
url VCID-fyah-c7dc-93gn
vulnerability_id VCID-fyah-c7dc-93gn
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22026
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34259
published_at 2026-04-02T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.34292
published_at 2026-04-04T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34156
published_at 2026-04-07T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34199
published_at 2026-04-08T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34228
published_at 2026-04-11T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34185
published_at 2026-04-18T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34161
published_at 2026-04-13T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34198
published_at 2026-04-16T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34148
published_at 2026-04-21T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.33775
published_at 2026-04-24T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.33753
published_at 2026-04-26T12:55:00Z
11
value 0.00153
scoring_system epss
scoring_elements 0.35685
published_at 2026-04-29T12:55:00Z
12
value 0.00153
scoring_system epss
scoring_elements 0.35571
published_at 2026-05-05T12:55:00Z
13
value 0.00153
scoring_system epss
scoring_elements 0.35641
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22026
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245012
reference_id 2245012
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245012
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
6
reference_url https://usn.ubuntu.com/6288-2/
reference_id USN-6288-2
reference_type
scores
url https://usn.ubuntu.com/6288-2/
fixed_packages
aliases CVE-2023-22026
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fyah-c7dc-93gn
23
url VCID-gf4v-xpef-8ygu
vulnerability_id VCID-gf4v-xpef-8ygu
summary mysql: Server: GIS unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21887
reference_id
reference_type
scores
0
value 0.49353
scoring_system epss
scoring_elements 0.9777
published_at 2026-04-02T12:55:00Z
1
value 0.49353
scoring_system epss
scoring_elements 0.97807
published_at 2026-05-07T12:55:00Z
2
value 0.49353
scoring_system epss
scoring_elements 0.97802
published_at 2026-04-29T12:55:00Z
3
value 0.49353
scoring_system epss
scoring_elements 0.97806
published_at 2026-05-05T12:55:00Z
4
value 0.49353
scoring_system epss
scoring_elements 0.97772
published_at 2026-04-04T12:55:00Z
5
value 0.49353
scoring_system epss
scoring_elements 0.97774
published_at 2026-04-07T12:55:00Z
6
value 0.49353
scoring_system epss
scoring_elements 0.97779
published_at 2026-04-08T12:55:00Z
7
value 0.49353
scoring_system epss
scoring_elements 0.97782
published_at 2026-04-09T12:55:00Z
8
value 0.49353
scoring_system epss
scoring_elements 0.97785
published_at 2026-04-11T12:55:00Z
9
value 0.49353
scoring_system epss
scoring_elements 0.97787
published_at 2026-04-12T12:55:00Z
10
value 0.49353
scoring_system epss
scoring_elements 0.97788
published_at 2026-04-13T12:55:00Z
11
value 0.49353
scoring_system epss
scoring_elements 0.97794
published_at 2026-04-24T12:55:00Z
12
value 0.49353
scoring_system epss
scoring_elements 0.97797
published_at 2026-04-18T12:55:00Z
13
value 0.49353
scoring_system epss
scoring_elements 0.97795
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21887
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162291
reference_id 2162291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162291
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21887
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gf4v-xpef-8ygu
24
url VCID-h13j-2a9m-xfbk
vulnerability_id VCID-h13j-2a9m-xfbk
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21879
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33138
published_at 2026-04-02T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.3258
published_at 2026-05-07T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.32654
published_at 2026-04-29T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.32517
published_at 2026-05-05T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-04T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33
published_at 2026-04-07T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33045
published_at 2026-04-08T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33075
published_at 2026-04-09T12:55:00Z
8
value 0.00134
scoring_system epss
scoring_elements 0.33077
published_at 2026-04-11T12:55:00Z
9
value 0.00134
scoring_system epss
scoring_elements 0.33039
published_at 2026-04-12T12:55:00Z
10
value 0.00134
scoring_system epss
scoring_elements 0.33015
published_at 2026-04-13T12:55:00Z
11
value 0.00134
scoring_system epss
scoring_elements 0.33057
published_at 2026-04-16T12:55:00Z
12
value 0.00134
scoring_system epss
scoring_elements 0.33034
published_at 2026-04-18T12:55:00Z
13
value 0.00134
scoring_system epss
scoring_elements 0.32998
published_at 2026-04-21T12:55:00Z
14
value 0.00134
scoring_system epss
scoring_elements 0.32852
published_at 2026-04-24T12:55:00Z
15
value 0.00134
scoring_system epss
scoring_elements 0.32738
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21879
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162286
reference_id 2162286
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162286
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21879
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h13j-2a9m-xfbk
25
url VCID-hpqm-5m4j-q3cx
vulnerability_id VCID-hpqm-5m4j-q3cx
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21881
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27766
published_at 2026-04-02T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27222
published_at 2026-05-07T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27328
published_at 2026-04-29T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27159
published_at 2026-05-05T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27804
published_at 2026-04-04T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27595
published_at 2026-04-07T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27662
published_at 2026-04-08T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27705
published_at 2026-04-09T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.2771
published_at 2026-04-11T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27666
published_at 2026-04-12T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27608
published_at 2026-04-13T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27617
published_at 2026-04-16T12:55:00Z
12
value 0.001
scoring_system epss
scoring_elements 0.27591
published_at 2026-04-18T12:55:00Z
13
value 0.001
scoring_system epss
scoring_elements 0.27552
published_at 2026-04-21T12:55:00Z
14
value 0.001
scoring_system epss
scoring_elements 0.27511
published_at 2026-04-24T12:55:00Z
15
value 0.001
scoring_system epss
scoring_elements 0.27405
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21881
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162288
reference_id 2162288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162288
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21881
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpqm-5m4j-q3cx
26
url VCID-huvv-nrxp-mbfq
vulnerability_id VCID-huvv-nrxp-mbfq
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21625
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21625
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142871
reference_id 2142871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142871
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21625
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-huvv-nrxp-mbfq
27
url VCID-jxwh-abnr-bkew
vulnerability_id VCID-jxwh-abnr-bkew
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-39408
reference_id
reference_type
scores
0
value 0.00164
scoring_system epss
scoring_elements 0.37518
published_at 2026-04-02T12:55:00Z
1
value 0.00164
scoring_system epss
scoring_elements 0.36969
published_at 2026-05-07T12:55:00Z
2
value 0.00164
scoring_system epss
scoring_elements 0.37385
published_at 2026-04-13T12:55:00Z
3
value 0.00164
scoring_system epss
scoring_elements 0.37431
published_at 2026-04-16T12:55:00Z
4
value 0.00164
scoring_system epss
scoring_elements 0.37413
published_at 2026-04-18T12:55:00Z
5
value 0.00164
scoring_system epss
scoring_elements 0.37357
published_at 2026-04-21T12:55:00Z
6
value 0.00164
scoring_system epss
scoring_elements 0.37138
published_at 2026-04-24T12:55:00Z
7
value 0.00164
scoring_system epss
scoring_elements 0.37107
published_at 2026-04-26T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.3702
published_at 2026-04-29T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.36902
published_at 2026-05-05T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37542
published_at 2026-04-04T12:55:00Z
11
value 0.00164
scoring_system epss
scoring_elements 0.37371
published_at 2026-04-07T12:55:00Z
12
value 0.00164
scoring_system epss
scoring_elements 0.37422
published_at 2026-04-08T12:55:00Z
13
value 0.00164
scoring_system epss
scoring_elements 0.37434
published_at 2026-04-09T12:55:00Z
14
value 0.00164
scoring_system epss
scoring_elements 0.37447
published_at 2026-04-11T12:55:00Z
15
value 0.00164
scoring_system epss
scoring_elements 0.37412
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-39408
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142880
reference_id 2142880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142880
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-39408
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwh-abnr-bkew
28
url VCID-jyys-fjmd-cbhw
vulnerability_id VCID-jyys-fjmd-cbhw
summary mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21913
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39179
published_at 2026-04-02T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39203
published_at 2026-04-11T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39201
published_at 2026-04-04T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.3912
published_at 2026-04-07T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-08T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39191
published_at 2026-04-09T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39166
published_at 2026-04-12T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39147
published_at 2026-04-13T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.392
published_at 2026-04-16T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.3917
published_at 2026-04-18T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39082
published_at 2026-04-21T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40141
published_at 2026-04-24T12:55:00Z
12
value 0.00208
scoring_system epss
scoring_elements 0.43073
published_at 2026-04-26T12:55:00Z
13
value 0.00436
scoring_system epss
scoring_elements 0.6306
published_at 2026-04-29T12:55:00Z
14
value 0.00436
scoring_system epss
scoring_elements 0.63016
published_at 2026-05-05T12:55:00Z
15
value 0.00436
scoring_system epss
scoring_elements 0.63062
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21913
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188111
reference_id 2188111
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188111
3
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:38Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
aliases CVE-2023-21913
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyys-fjmd-cbhw
29
url VCID-kyj1-d2zy-83f5
vulnerability_id VCID-kyj1-d2zy-83f5
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21640
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21640
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142877
reference_id 2142877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142877
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21640
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kyj1-d2zy-83f5
30
url VCID-muua-g6dy-6ub1
vulnerability_id VCID-muua-g6dy-6ub1
summary mysql: Server: DML unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21836
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32733
published_at 2026-04-02T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32154
published_at 2026-05-07T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-29T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.3209
published_at 2026-05-05T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32769
published_at 2026-04-04T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.3259
published_at 2026-04-07T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32638
published_at 2026-04-16T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32664
published_at 2026-04-09T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32666
published_at 2026-04-11T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32628
published_at 2026-04-12T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.326
published_at 2026-04-13T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32616
published_at 2026-04-18T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32585
published_at 2026-04-21T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.3243
published_at 2026-04-24T12:55:00Z
14
value 0.00131
scoring_system epss
scoring_elements 0.32314
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21836
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162268
reference_id 2162268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162268
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21836
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-muua-g6dy-6ub1
31
url VCID-r61x-fj13-v3b5
vulnerability_id VCID-r61x-fj13-v3b5
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21604
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21604
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142865
reference_id 2142865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142865
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21604
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r61x-fj13-v3b5
32
url VCID-rna4-zqrp-77fr
vulnerability_id VCID-rna4-zqrp-77fr
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21880
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26926
published_at 2026-04-02T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26512
published_at 2026-05-07T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26576
published_at 2026-04-29T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26443
published_at 2026-05-05T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26962
published_at 2026-04-04T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26753
published_at 2026-04-07T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26822
published_at 2026-04-08T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26869
published_at 2026-04-09T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26872
published_at 2026-04-11T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26828
published_at 2026-04-12T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.2677
published_at 2026-04-13T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26777
published_at 2026-04-16T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26749
published_at 2026-04-18T12:55:00Z
13
value 0.00097
scoring_system epss
scoring_elements 0.26711
published_at 2026-04-21T12:55:00Z
14
value 0.00097
scoring_system epss
scoring_elements 0.26654
published_at 2026-04-24T12:55:00Z
15
value 0.00097
scoring_system epss
scoring_elements 0.26646
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21880
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162287
reference_id 2162287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162287
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21880
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rna4-zqrp-77fr
33
url VCID-s77u-5edq-tkec
vulnerability_id VCID-s77u-5edq-tkec
summary mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21617
reference_id
reference_type
scores
0
value 0.00092
scoring_system epss
scoring_elements 0.25983
published_at 2026-04-02T12:55:00Z
1
value 0.00092
scoring_system epss
scoring_elements 0.25867
published_at 2026-04-08T12:55:00Z
2
value 0.00092
scoring_system epss
scoring_elements 0.25918
published_at 2026-04-09T12:55:00Z
3
value 0.00092
scoring_system epss
scoring_elements 0.25929
published_at 2026-04-11T12:55:00Z
4
value 0.00092
scoring_system epss
scoring_elements 0.25887
published_at 2026-04-12T12:55:00Z
5
value 0.00092
scoring_system epss
scoring_elements 0.25832
published_at 2026-04-13T12:55:00Z
6
value 0.00092
scoring_system epss
scoring_elements 0.25835
published_at 2026-04-16T12:55:00Z
7
value 0.00092
scoring_system epss
scoring_elements 0.25817
published_at 2026-04-18T12:55:00Z
8
value 0.00092
scoring_system epss
scoring_elements 0.25787
published_at 2026-04-21T12:55:00Z
9
value 0.00092
scoring_system epss
scoring_elements 0.25732
published_at 2026-04-24T12:55:00Z
10
value 0.00092
scoring_system epss
scoring_elements 0.25724
published_at 2026-04-26T12:55:00Z
11
value 0.00092
scoring_system epss
scoring_elements 0.25677
published_at 2026-04-29T12:55:00Z
12
value 0.00092
scoring_system epss
scoring_elements 0.26025
published_at 2026-04-04T12:55:00Z
13
value 0.00092
scoring_system epss
scoring_elements 0.25796
published_at 2026-04-07T12:55:00Z
14
value 0.00156
scoring_system epss
scoring_elements 0.35883
published_at 2026-05-07T12:55:00Z
15
value 0.00156
scoring_system epss
scoring_elements 0.35814
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21617
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142870
reference_id 2142870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142870
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
11
reference_url https://usn.ubuntu.com/5696-2/
reference_id USN-5696-2
reference_type
scores
url https://usn.ubuntu.com/5696-2/
fixed_packages
aliases CVE-2022-21617
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s77u-5edq-tkec
34
url VCID-w32w-gync-fyf3
vulnerability_id VCID-w32w-gync-fyf3
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21865
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26793
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26378
published_at 2026-05-07T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26441
published_at 2026-04-29T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26309
published_at 2026-05-05T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26834
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26618
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26685
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26735
published_at 2026-04-09T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26739
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26695
published_at 2026-04-12T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26638
published_at 2026-04-13T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26645
published_at 2026-04-16T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.26617
published_at 2026-04-18T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26578
published_at 2026-04-21T12:55:00Z
14
value 0.00096
scoring_system epss
scoring_elements 0.2652
published_at 2026-04-24T12:55:00Z
15
value 0.00096
scoring_system epss
scoring_elements 0.26513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21865
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162272
reference_id 2162272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162272
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
fixed_packages
aliases CVE-2023-21865
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w32w-gync-fyf3
35
url VCID-w9e8-gnnz-rugf
vulnerability_id VCID-w9e8-gnnz-rugf
summary mysql: InnoDB unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21637
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21637
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142875
reference_id 2142875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142875
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21637
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9e8-gnnz-rugf
36
url VCID-wcd1-xgsy-rkfx
vulnerability_id VCID-wcd1-xgsy-rkfx
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21912
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35539
published_at 2026-04-02T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35527
published_at 2026-04-11T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35438
published_at 2026-04-21T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35203
published_at 2026-04-24T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.3518
published_at 2026-04-26T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.351
published_at 2026-04-29T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.34979
published_at 2026-05-05T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35564
published_at 2026-04-04T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35447
published_at 2026-04-07T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35493
published_at 2026-04-08T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35517
published_at 2026-04-09T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35483
published_at 2026-04-12T12:55:00Z
12
value 0.00149
scoring_system epss
scoring_elements 0.35461
published_at 2026-04-13T12:55:00Z
13
value 0.00149
scoring_system epss
scoring_elements 0.35501
published_at 2026-04-16T12:55:00Z
14
value 0.00149
scoring_system epss
scoring_elements 0.3549
published_at 2026-04-18T12:55:00Z
15
value 0.00174
scoring_system epss
scoring_elements 0.3837
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21912
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2188110
reference_id 2188110
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2188110
3
reference_url https://security.netapp.com/advisory/ntap-20230427-0007/
reference_id ntap-20230427-0007
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:44Z/
url https://security.netapp.com/advisory/ntap-20230427-0007/
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/6060-1/
reference_id USN-6060-1
reference_type
scores
url https://usn.ubuntu.com/6060-1/
8
reference_url https://usn.ubuntu.com/6060-2/
reference_id USN-6060-2
reference_type
scores
url https://usn.ubuntu.com/6060-2/
fixed_packages
aliases CVE-2023-21912
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcd1-xgsy-rkfx
37
url VCID-wg76-asva-3qce
vulnerability_id VCID-wg76-asva-3qce
summary mysql: InnoDB unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21877
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32671
published_at 2026-04-02T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32075
published_at 2026-05-07T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.3215
published_at 2026-04-29T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.3201
published_at 2026-05-05T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32706
published_at 2026-04-04T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32527
published_at 2026-04-07T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.32574
published_at 2026-04-08T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32601
published_at 2026-04-09T12:55:00Z
8
value 0.00131
scoring_system epss
scoring_elements 0.32602
published_at 2026-04-11T12:55:00Z
9
value 0.00131
scoring_system epss
scoring_elements 0.32565
published_at 2026-04-12T12:55:00Z
10
value 0.00131
scoring_system epss
scoring_elements 0.32538
published_at 2026-04-13T12:55:00Z
11
value 0.00131
scoring_system epss
scoring_elements 0.32575
published_at 2026-04-16T12:55:00Z
12
value 0.00131
scoring_system epss
scoring_elements 0.32552
published_at 2026-04-18T12:55:00Z
13
value 0.00131
scoring_system epss
scoring_elements 0.3252
published_at 2026-04-21T12:55:00Z
14
value 0.00131
scoring_system epss
scoring_elements 0.3235
published_at 2026-04-24T12:55:00Z
15
value 0.00131
scoring_system epss
scoring_elements 0.32235
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21877
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162284
reference_id 2162284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162284
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21877
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wg76-asva-3qce
38
url VCID-wuf9-tbh8-ffat
vulnerability_id VCID-wuf9-tbh8-ffat
summary mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-21883
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.2667
published_at 2026-04-02T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.2627
published_at 2026-05-07T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26336
published_at 2026-04-29T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26204
published_at 2026-05-05T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26712
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26498
published_at 2026-04-18T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26566
published_at 2026-04-08T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26615
published_at 2026-04-09T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.2662
published_at 2026-04-11T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26575
published_at 2026-04-12T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26518
published_at 2026-04-13T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26525
published_at 2026-04-16T12:55:00Z
12
value 0.00096
scoring_system epss
scoring_elements 0.2646
published_at 2026-04-21T12:55:00Z
13
value 0.00096
scoring_system epss
scoring_elements 0.26398
published_at 2026-04-24T12:55:00Z
14
value 0.00096
scoring_system epss
scoring_elements 0.26393
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-21883
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
reference_id 1029151
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162290
reference_id 2162290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162290
4
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
5
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
6
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
7
reference_url https://usn.ubuntu.com/5823-1/
reference_id USN-5823-1
reference_type
scores
url https://usn.ubuntu.com/5823-1/
fixed_packages
aliases CVE-2023-21883
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wuf9-tbh8-ffat
39
url VCID-yur8-xgu4-pqbc
vulnerability_id VCID-yur8-xgu4-pqbc
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22028
reference_id
reference_type
scores
0
value 0.00114
scoring_system epss
scoring_elements 0.30102
published_at 2026-04-02T12:55:00Z
1
value 0.00114
scoring_system epss
scoring_elements 0.30151
published_at 2026-04-04T12:55:00Z
2
value 0.00114
scoring_system epss
scoring_elements 0.29964
published_at 2026-04-07T12:55:00Z
3
value 0.00114
scoring_system epss
scoring_elements 0.30024
published_at 2026-04-08T12:55:00Z
4
value 0.00114
scoring_system epss
scoring_elements 0.3006
published_at 2026-04-09T12:55:00Z
5
value 0.00114
scoring_system epss
scoring_elements 0.30064
published_at 2026-04-11T12:55:00Z
6
value 0.00114
scoring_system epss
scoring_elements 0.3002
published_at 2026-04-12T12:55:00Z
7
value 0.00114
scoring_system epss
scoring_elements 0.29986
published_at 2026-04-16T12:55:00Z
8
value 0.00114
scoring_system epss
scoring_elements 0.29965
published_at 2026-04-18T12:55:00Z
9
value 0.00114
scoring_system epss
scoring_elements 0.29919
published_at 2026-04-21T12:55:00Z
10
value 0.00114
scoring_system epss
scoring_elements 0.29971
published_at 2026-04-13T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31426
published_at 2026-04-24T12:55:00Z
12
value 0.00124
scoring_system epss
scoring_elements 0.313
published_at 2026-04-26T12:55:00Z
13
value 0.00125
scoring_system epss
scoring_elements 0.31239
published_at 2026-05-07T12:55:00Z
14
value 0.00136
scoring_system epss
scoring_elements 0.33089
published_at 2026-04-29T12:55:00Z
15
value 0.00136
scoring_system epss
scoring_elements 0.32973
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22028
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245013
reference_id 2245013
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245013
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
6
reference_url https://usn.ubuntu.com/6583-1/
reference_id USN-6583-1
reference_type
scores
url https://usn.ubuntu.com/6583-1/
fixed_packages
aliases CVE-2023-22028
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yur8-xgu4-pqbc
40
url VCID-zc2d-3ejk-g7b9
vulnerability_id VCID-zc2d-3ejk-g7b9
summary mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-22015
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.3405
published_at 2026-04-02T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.3408
published_at 2026-04-04T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33938
published_at 2026-04-07T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.3398
published_at 2026-04-08T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.34012
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.34011
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33968
published_at 2026-04-12T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33945
published_at 2026-04-13T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33981
published_at 2026-04-16T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33967
published_at 2026-04-18T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33935
published_at 2026-04-21T12:55:00Z
11
value 0.00138
scoring_system epss
scoring_elements 0.33561
published_at 2026-04-24T12:55:00Z
12
value 0.00138
scoring_system epss
scoring_elements 0.33541
published_at 2026-04-26T12:55:00Z
13
value 0.00152
scoring_system epss
scoring_elements 0.35454
published_at 2026-04-29T12:55:00Z
14
value 0.00152
scoring_system epss
scoring_elements 0.35339
published_at 2026-05-05T12:55:00Z
15
value 0.00152
scoring_system epss
scoring_elements 0.35409
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-22015
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2245011
reference_id 2245011
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2245011
3
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
4
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
5
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
6
reference_url https://usn.ubuntu.com/6288-2/
reference_id USN-6288-2
reference_type
scores
url https://usn.ubuntu.com/6288-2/
fixed_packages
aliases CVE-2023-22015
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc2d-3ejk-g7b9
41
url VCID-zsw1-uqnv-ekfy
vulnerability_id VCID-zsw1-uqnv-ekfy
summary mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-21632
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21232
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20883
published_at 2026-05-07T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21094
published_at 2026-04-13T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21085
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-18T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21074
published_at 2026-04-21T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20948
published_at 2026-04-24T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-26T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20918
published_at 2026-04-29T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-05-05T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.21285
published_at 2026-04-04T12:55:00Z
11
value 0.00068
scoring_system epss
scoring_elements 0.21036
published_at 2026-04-07T12:55:00Z
12
value 0.00068
scoring_system epss
scoring_elements 0.21118
published_at 2026-04-08T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.21179
published_at 2026-04-09T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.21189
published_at 2026-04-11T12:55:00Z
15
value 0.00068
scoring_system epss
scoring_elements 0.21146
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-21632
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
reference_id 1024016
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2142872
reference_id 2142872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2142872
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
reference_id EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
reference_id NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/
6
reference_url https://security.netapp.com/advisory/ntap-20221028-0013/
reference_id ntap-20221028-0013
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/
url https://security.netapp.com/advisory/ntap-20221028-0013/
7
reference_url https://access.redhat.com/errata/RHSA-2023:1102
reference_id RHSA-2023:1102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1102
8
reference_url https://access.redhat.com/errata/RHSA-2023:2621
reference_id RHSA-2023:2621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2621
9
reference_url https://access.redhat.com/errata/RHSA-2023:3087
reference_id RHSA-2023:3087
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3087
10
reference_url https://usn.ubuntu.com/5696-1/
reference_id USN-5696-1
reference_type
scores
url https://usn.ubuntu.com/5696-1/
fixed_packages
aliases CVE-2022-21632
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zsw1-uqnv-ekfy
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@8.0.32-1%3Farch=el9_2