{"url":"http://public2.vulnerablecode.io/api/packages/95449?format=json","purl":"pkg:rpm/redhat/mariadb@3:10.5.22-1?arch=el9_0","type":"rpm","namespace":"redhat","name":"mariadb","version":"3:10.5.22-1","qualifiers":{"arch":"el9_0"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61746?format=json","vulnerability_id":"VCID-5142-jmqx-zffm","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32081","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33113","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33108","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32905","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3283","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32719","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32827","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3276","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32839","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32081"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32081"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106028","reference_id":"2106028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106028"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32081"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5142-jmqx-zffm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61747?format=json","vulnerability_id":"VCID-bufd-a3f4-7ucf","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32082.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32082","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39126","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39046","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39101","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39117","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39129","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39072","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39097","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38802","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38692","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38569","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38642","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38655","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38593","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38667","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32082"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32082"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106030","reference_id":"2106030","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106030"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32082"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bufd-a3f4-7ucf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61756?format=json","vulnerability_id":"VCID-c45y-pbjr-73ez","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-47015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47015","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37638","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37588","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37562","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44765","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44695","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44511","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44615","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.4473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44732","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00221","scoring_system":"epss","scoring_elements":"0.44773","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-47015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47015"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889","reference_id":"1034889","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034889"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163609","reference_id":"2163609","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163609"},{"reference_url":"https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954","reference_id":"be0a46b3d52b58956fd0d47d040b9f4514406954","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"}],"url":"https://github.com/MariaDB/server/commit/be0a46b3d52b58956fd0d47d040b9f4514406954"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/06/msg00005.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230309-0009/","reference_id":"ntap-20230309-0009","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230309-0009/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/","reference_id":"O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O22PO3Q6TRSNJI2A2WTJH3VVCHEKBF6C/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5259","reference_id":"RHSA-2023:5259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/","reference_id":"SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-03T15:56:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SUQ33SPQCZQD63TWAM3XKFNVNFRGPFYU/"},{"reference_url":"https://usn.ubuntu.com/6600-1/","reference_id":"USN-6600-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6600-1/"}],"fixed_packages":[],"aliases":["CVE-2022-47015"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c45y-pbjr-73ez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61755?format=json","vulnerability_id":"VCID-cnw5-r38y-4uc5","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-38791.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38791","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10387","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10414","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10369","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1036","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10251","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10397","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10465","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10485","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10541","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-38791"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38791"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130105","reference_id":"2130105","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130105"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5259","reference_id":"RHSA-2023:5259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"}],"fixed_packages":[],"aliases":["CVE-2022-38791"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cnw5-r38y-4uc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61754?format=json","vulnerability_id":"VCID-gqcv-pefj-43au","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32091.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32091","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54918","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54833","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54932","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54892","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54917","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54978","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32091"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32091"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106042","reference_id":"2106042","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106042"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5259","reference_id":"RHSA-2023:5259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32091"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqcv-pefj-43au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61757?format=json","vulnerability_id":"VCID-mzms-rvbp-h3ga","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5157.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5157","reference_id":"","reference_type":"","scores":[{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69519","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69444","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69479","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69447","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69472","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69359","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.6937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.6938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69412","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69419","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00596","scoring_system":"epss","scoring_elements":"0.69423","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69769","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69777","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5157"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240246","reference_id":"2240246","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240246"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7","reference_id":"cpe:/a:redhat:rhel_software_collections:3::el7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_software_collections:3::el7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-5157","reference_id":"CVE-2023-5157","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-5157"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5259","reference_id":"RHSA-2023:5259","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-18T14:14:15Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7633"}],"fixed_packages":[],"aliases":["CVE-2023-5157"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mzms-rvbp-h3ga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61753?format=json","vulnerability_id":"VCID-r9tj-2m3h-a7fh","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32089.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32089","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33113","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33108","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32905","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3283","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32719","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32827","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32735","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3276","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32839","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32089"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106035","reference_id":"2106035","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106035"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32089"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r9tj-2m3h-a7fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61749?format=json","vulnerability_id":"VCID-tk47-7pwj-fkh5","summary":"Multiple vulnerabilities have been discovered in MariaDB, the worst fo which can lead to arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32084.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32084","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54906","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54925","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54923","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54936","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54918","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54833","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54932","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54892","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54917","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54978","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32084"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32084"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106034","reference_id":"2106034","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106034"},{"reference_url":"https://security.gentoo.org/glsa/202405-25","reference_id":"GLSA-202405-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-25"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5259","reference_id":"RHSA-2023:5259","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5683","reference_id":"RHSA-2023:5683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5684","reference_id":"RHSA-2023:5684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6822","reference_id":"RHSA-2023:6822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6883","reference_id":"RHSA-2023:6883","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6883"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7633","reference_id":"RHSA-2023:7633","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7633"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32084"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tk47-7pwj-fkh5"}],"fixing_vulnerabilities":[],"risk_score":"3.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mariadb@3:10.5.22-1%3Farch=el9_0"}