{"url":"http://public2.vulnerablecode.io/api/packages/95078?format=json","purl":"pkg:rpm/redhat/mysql@8.0.32-1?arch=el9_2","type":"rpm","namespace":"redhat","name":"mysql","version":"8.0.32-1","qualifiers":{"arch":"el9_2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78743?format=json","vulnerability_id":"VCID-1jm9-vjfe-skgu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21870","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26433","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21870"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162277","reference_id":"2162277","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162277"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21870"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1jm9-vjfe-skgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78755?format=json","vulnerability_id":"VCID-22uu-xxpk-37av","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21882.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21882","reference_id":"","reference_type":"","scores":[{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23821","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23666","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23751","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24084","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23963","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23841","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.2383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23789","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21882"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162289","reference_id":"2162289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21882"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22uu-xxpk-37av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78497?format=json","vulnerability_id":"VCID-2aa4-79kv-ruge","summary":"mysql: Server: Connection Handling unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21963.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21963","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21362","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21313","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21288","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21031","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.215","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21252","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21332","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21393","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21304","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26136","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2619","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21963"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188126","reference_id":"2188126","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188126"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T14:38:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[],"aliases":["CVE-2023-21963"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2aa4-79kv-ruge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78747?format=json","vulnerability_id":"VCID-2fsg-vrnf-n7ff","summary":"mysql: Server: Thread Pooling unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21874.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21874","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15696","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15636","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15414","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15534","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15706","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15574","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15543","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21874"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162281","reference_id":"2162281","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[],"aliases":["CVE-2023-21874"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fsg-vrnf-n7ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78936?format=json","vulnerability_id":"VCID-2pmu-2dwp-mba2","summary":"mysql: Server: Replication unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21633.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21633","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21599","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21553","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21447","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21513","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21733","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21633"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142873","reference_id":"2142873","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142873"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21633"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pmu-2dwp-mba2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78924?format=json","vulnerability_id":"VCID-39xf-9may-73az","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21594.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21594","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21594"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142861","reference_id":"2142861","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142861"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21594"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-39xf-9may-73az"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78741?format=json","vulnerability_id":"VCID-4cc4-gy7g-8kb9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21868","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32215","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32141","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32205","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32818","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32639","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32715","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32678","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3265","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32634","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3248","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32364","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32281","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21868"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162275","reference_id":"2162275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21868"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4cc4-gy7g-8kb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78942?format=json","vulnerability_id":"VCID-81qz-dkfs-wkan","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39400.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39400","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39400"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142879","reference_id":"2142879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142879"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39400"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-81qz-dkfs-wkan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78748?format=json","vulnerability_id":"VCID-859e-runv-4qah","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21875.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21875","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38403","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38837","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38815","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38826","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38802","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38798","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38553","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38441","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21875"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162282","reference_id":"2162282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21875"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-859e-runv-4qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78746?format=json","vulnerability_id":"VCID-8x1f-u547-tqb3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21873","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21873"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162280","reference_id":"2162280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21873"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8x1f-u547-tqb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78751?format=json","vulnerability_id":"VCID-9x3z-66pg-13c9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21878.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21878","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31824","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31815","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32273","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32322","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32351","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32095","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31971","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3189","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21878"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162285","reference_id":"2162285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21878"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9x3z-66pg-13c9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78926?format=json","vulnerability_id":"VCID-a91v-ghah-17cp","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21599","reference_id":"","reference_type":"","scores":[{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20197","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.2067","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20512","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21867","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2192","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21763","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2182","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21734","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21599"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142863","reference_id":"2142863","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142863"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:12Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21599"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a91v-ghah-17cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78932?format=json","vulnerability_id":"VCID-aq75-zern-cfc1","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21611","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07255","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07017","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07164","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.0701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06993","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21611"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142869","reference_id":"2142869","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142869"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21611"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aq75-zern-cfc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78749?format=json","vulnerability_id":"VCID-athx-ebka-d3h9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21876","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32589","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32517","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3258","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32654","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21876"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162283","reference_id":"2162283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21876"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-athx-ebka-d3h9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78931?format=json","vulnerability_id":"VCID-b243-p5y2-f3gp","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21608","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25689","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25724","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25563","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25629","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21608"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142868","reference_id":"2142868","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142868"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21608"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b243-p5y2-f3gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78736?format=json","vulnerability_id":"VCID-b72z-7wpc-7uhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21863","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21863"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162270","reference_id":"2162270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162270"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21863"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b72z-7wpc-7uhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78944?format=json","vulnerability_id":"VCID-brdf-qg3q-7yc2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39410","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37357","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37412","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37385","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39410"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142881","reference_id":"2142881","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142881"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:31Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39410"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-brdf-qg3q-7yc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78742?format=json","vulnerability_id":"VCID-cba4-wgmt-67h8","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21869.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21869","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2672","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26604","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26672","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21869"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162276","reference_id":"2162276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162276"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21869"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cba4-wgmt-67h8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78740?format=json","vulnerability_id":"VCID-chj1-f5ha-4bfu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21867","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26433","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21867"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162274","reference_id":"2162274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21867"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-chj1-f5ha-4bfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78484?format=json","vulnerability_id":"VCID-d9d6-kt1p-17ej","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21917.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21917","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36263","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36211","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36291","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36235","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39214","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3923","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21917"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188112","reference_id":"2188112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188112"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[],"aliases":["CVE-2023-21917"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d9d6-kt1p-17ej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78737?format=json","vulnerability_id":"VCID-dkss-szpz-cfdh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21864","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21864"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162271","reference_id":"2162271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162271"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[],"aliases":["CVE-2023-21864"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkss-szpz-cfdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78744?format=json","vulnerability_id":"VCID-dudq-65hd-kfek","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21871","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25714","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25773","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26073","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26083","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26038","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25979","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25872","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25821","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21871"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162278","reference_id":"2162278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162278"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21871"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dudq-65hd-kfek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78002?format=json","vulnerability_id":"VCID-fyah-c7dc-93gn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22026","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34259","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34292","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34156","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34199","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34228","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34161","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33775","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.33753","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35685","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35571","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35641","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35662","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245012","reference_id":"2245012","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[],"aliases":["CVE-2023-22026"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyah-c7dc-93gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78757?format=json","vulnerability_id":"VCID-gf4v-xpef-8ygu","summary":"mysql: Server: GIS unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21887.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21887","reference_id":"","reference_type":"","scores":[{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.9777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97809","published_at":"2026-05-09T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97806","published_at":"2026-05-05T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97788","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97795","published_at":"2026-04-26T12:55:00Z"},{"value":"0.49353","scoring_system":"epss","scoring_elements":"0.97802","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21887"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162291","reference_id":"2162291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21887"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gf4v-xpef-8ygu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78752?format=json","vulnerability_id":"VCID-h13j-2a9m-xfbk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21879.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21879","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33138","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32589","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32517","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3258","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33075","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33057","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33034","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32998","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32738","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32654","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21879"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162286","reference_id":"2162286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21879"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h13j-2a9m-xfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78754?format=json","vulnerability_id":"VCID-hpqm-5m4j-q3cx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21881.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21881","reference_id":"","reference_type":"","scores":[{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27766","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27242","published_at":"2026-05-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27159","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27222","published_at":"2026-05-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27595","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27705","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.2771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27666","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27511","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27405","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27328","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21881"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162288","reference_id":"2162288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21881"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hpqm-5m4j-q3cx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78934?format=json","vulnerability_id":"VCID-huvv-nrxp-mbfq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21625","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21625"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142871","reference_id":"2142871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142871"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21625"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-huvv-nrxp-mbfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78943?format=json","vulnerability_id":"VCID-jxwh-abnr-bkew","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39408","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37518","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36988","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37357","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37138","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36969","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37542","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37447","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37412","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37385","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142880","reference_id":"2142880","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142880"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-39408"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwh-abnr-bkew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78483?format=json","vulnerability_id":"VCID-jyys-fjmd-cbhw","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21913.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21913","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39179","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39201","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39203","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.392","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39082","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00208","scoring_system":"epss","scoring_elements":"0.43073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6306","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63016","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63062","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.63114","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21913"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188111","reference_id":"2188111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188111"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[],"aliases":["CVE-2023-21913"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyys-fjmd-cbhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78940?format=json","vulnerability_id":"VCID-kyj1-d2zy-83f5","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21640.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21640","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21640"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142877","reference_id":"2142877","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142877"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21640"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kyj1-d2zy-83f5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78734?format=json","vulnerability_id":"VCID-muua-g6dy-6ub1","summary":"mysql: Server: DML unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21836","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32162","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3209","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32154","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32638","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32628","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.326","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32585","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3243","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32231","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162268","reference_id":"2162268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162268"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21836"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-muua-g6dy-6ub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78928?format=json","vulnerability_id":"VCID-r61x-fj13-v3b5","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21604","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21604"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142865","reference_id":"2142865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142865"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:11Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21604"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r61x-fj13-v3b5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78753?format=json","vulnerability_id":"VCID-rna4-zqrp-77fr","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21880","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26926","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26568","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26443","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26512","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26872","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26828","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26777","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26749","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26711","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26654","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26646","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26576","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21880"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162287","reference_id":"2162287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21880"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rna4-zqrp-77fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78933?format=json","vulnerability_id":"VCID-s77u-5edq-tkec","summary":"mysql: Server: Connection Handling unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21617.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21617","reference_id":"","reference_type":"","scores":[{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25918","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25787","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25732","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25724","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.25677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00092","scoring_system":"epss","scoring_elements":"0.26025","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35902","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35814","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35883","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21617"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142870","reference_id":"2142870","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142870"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21617"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s77u-5edq-tkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78738?format=json","vulnerability_id":"VCID-w32w-gync-fyf3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21865.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21865","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26433","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26378","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26618","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26685","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26739","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26645","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26578","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26513","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26441","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21865"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162272","reference_id":"2162272","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162272"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"}],"fixed_packages":[],"aliases":["CVE-2023-21865"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w32w-gync-fyf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78938?format=json","vulnerability_id":"VCID-w9e8-gnnz-rugf","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21637.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21637","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21637"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142875","reference_id":"2142875","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142875"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21637"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9e8-gnnz-rugf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78482?format=json","vulnerability_id":"VCID-wcd1-xgsy-rkfx","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21912.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21912","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35483","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3549","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35438","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35203","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.351","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34979","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35564","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35493","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35517","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35527","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3837","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38381","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21912"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188110","reference_id":"2188110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188110"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230427-0007/","reference_id":"ntap-20230427-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-16T19:39:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230427-0007/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6060-1/","reference_id":"USN-6060-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-1/"},{"reference_url":"https://usn.ubuntu.com/6060-2/","reference_id":"USN-6060-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6060-2/"}],"fixed_packages":[],"aliases":["CVE-2023-21912"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcd1-xgsy-rkfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78750?format=json","vulnerability_id":"VCID-wg76-asva-3qce","summary":"mysql: InnoDB unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21877","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32671","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32084","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3201","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32075","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32706","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32574","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32601","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32565","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32538","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32575","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32235","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.3215","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21877"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162284","reference_id":"2162284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21877"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wg76-asva-3qce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78756?format=json","vulnerability_id":"VCID-wuf9-tbh8-ffat","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21883.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21883","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26325","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2627","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26712","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26566","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26575","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26518","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26398","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26336","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21883"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151","reference_id":"1029151","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1029151"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162290","reference_id":"2162290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162290"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5823-1/","reference_id":"USN-5823-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5823-1/"}],"fixed_packages":[],"aliases":["CVE-2023-21883"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wuf9-tbh8-ffat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78003?format=json","vulnerability_id":"VCID-yur8-xgu4-pqbc","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22028","reference_id":"","reference_type":"","scores":[{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30024","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.30064","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.3002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00114","scoring_system":"epss","scoring_elements":"0.29986","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31426","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.313","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31239","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31246","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.33089","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00136","scoring_system":"epss","scoring_elements":"0.32973","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245013","reference_id":"2245013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6583-1/","reference_id":"USN-6583-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6583-1/"}],"fixed_packages":[],"aliases":["CVE-2023-22028"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yur8-xgu4-pqbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78001?format=json","vulnerability_id":"VCID-zc2d-3ejk-g7b9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-22015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22015","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3405","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3408","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33938","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3398","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34012","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.34011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33968","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33967","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33561","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35339","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35409","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35431","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-22015"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245011","reference_id":"2245011","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/6288-2/","reference_id":"USN-6288-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6288-2/"}],"fixed_packages":[],"aliases":["CVE-2023-22015"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zc2d-3ejk-g7b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78935?format=json","vulnerability_id":"VCID-zsw1-uqnv-ekfy","summary":"mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21632.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21632","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20967","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21085","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21074","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20948","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20951","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2081","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21118","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21189","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21094","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21632"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016","reference_id":"1024016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024016"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142872","reference_id":"2142872","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142872"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/","reference_id":"EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EG3VBUHKCUXVWBSCD2FHCWIAMZO4X3PR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/","reference_id":"NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NGZ4B5IQJEZQFSXGCZKSJ6GO3HLQ6URQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:1102","reference_id":"RHSA-2023:1102","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:1102"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2621","reference_id":"RHSA-2023:2621","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2621"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3087","reference_id":"RHSA-2023:3087","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3087"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21632"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsw1-uqnv-ekfy"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@8.0.32-1%3Farch=el9_2"}