Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/95795?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/95795?format=api", "purl": "pkg:rpm/redhat/rh-mysql80-mysql@8.0.30-1?arch=el7", "type": "rpm", "namespace": "redhat", "name": "rh-mysql80-mysql", "version": "8.0.30-1", "qualifiers": { "arch": "el7" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79981?format=api", "vulnerability_id": "VCID-129c-q69g-nkbu", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35636" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016124", "reference_id": "2016124", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016124" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35636" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-129c-q69g-nkbu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79793?format=api", "vulnerability_id": "VCID-13v8-wt9t-8kcs", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48189", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48116", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48085", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48114", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48051", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21362" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043641", "reference_id": "2043641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043641" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21362" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-13v8-wt9t-8kcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79973?format=api", "vulnerability_id": "VCID-1748-hmbg-hbhk", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35628" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016114", "reference_id": "2016114", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016114" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35628" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1748-hmbg-hbhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79991?format=api", "vulnerability_id": "VCID-259b-q1uk-vyap", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35646.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35646", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54905", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54856", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35646" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016135", "reference_id": "2016135", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016135" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:03Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35646" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-259b-q1uk-vyap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79222?format=api", "vulnerability_id": "VCID-2jks-ehmr-73aj", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21534", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21534" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115294", "reference_id": "2115294", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:16Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21534" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jks-ehmr-73aj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79960?format=api", "vulnerability_id": "VCID-34tb-1r12-kbe9", "summary": "mysql: C API unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35597.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71378", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71386", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71626", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71472", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71503", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.7151", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71514", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71502", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71537", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71573", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71539", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71569", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71404", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.7142", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71454", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71438", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71421", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71467", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35597" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016099", "reference_id": "2016099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016099" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0005/", "reference_id": "ntap-20211022-0005", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0005/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35597" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34tb-1r12-kbe9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79976?format=api", "vulnerability_id": "VCID-35tu-zc9b-j7dd", "summary": "mysql: Server: GIS unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35631.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35631", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35631" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016118", "reference_id": "2016118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016118" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35631" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35tu-zc9b-j7dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79962?format=api", "vulnerability_id": "VCID-36fa-z98h-3yfk", "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42833", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43036", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.4308", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43068", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42939", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42858", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42719", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42795", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42811", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42738", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42767", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43049", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101", "reference_id": "2016101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://usn.ubuntu.com/5123-2/", "reference_id": "USN-5123-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-2/" }, { "reference_url": "https://usn.ubuntu.com/5170-1/", "reference_id": "USN-5170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5170-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35604" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79780?format=api", "vulnerability_id": "VCID-39ju-7pvp-hqbv", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21278.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62388", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62576", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6244", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62544", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62497", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62522", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62385", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62469", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62459", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62487", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62479", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62493", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21278" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043628", "reference_id": "2043628", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043628" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:49Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21278" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-39ju-7pvp-hqbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79980?format=api", "vulnerability_id": "VCID-3kv6-pbgg-c3au", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35635" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016122", "reference_id": "2016122", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016122" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35635" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3kv6-pbgg-c3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79990?format=api", "vulnerability_id": "VCID-3qju-u4f8-6ybw", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35645.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35645", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35645" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016134", "reference_id": "2016134", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016134" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:04Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35645" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3qju-u4f8-6ybw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79210?format=api", "vulnerability_id": "VCID-3w7d-u3hs-x7fr", "summary": "mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21455", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.5547", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55497", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55495", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55525", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55526", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55514", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55537", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58062", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58063", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58048", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58008", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5811", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58091", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58162", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58083", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58049", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21455" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115282", "reference_id": "2115282", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21455" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3w7d-u3hs-x7fr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79492?format=api", "vulnerability_id": "VCID-3zjk-18aa-9kbk", "summary": "mysql: Server: DML unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21413", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45184", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45058", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45123", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4514", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45082", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45109", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21413" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082637", "reference_id": "2082637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082637" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21413" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3zjk-18aa-9kbk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79968?format=api", "vulnerability_id": "VCID-4d3p-r6am-xucc", "summary": "mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35623.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35623", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29099", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2906", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29075", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.28998", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29018", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2951", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29483", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29323", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29209", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29144", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35623" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016109", "reference_id": "2016109", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016109" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:26Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35623" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4d3p-r6am-xucc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79784?format=api", "vulnerability_id": "VCID-4dc2-2bx4-uke7", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21303.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21303", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51363", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5126", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51289", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21303" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043632", "reference_id": "2043632", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043632" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21303" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4dc2-2bx4-uke7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79983?format=api", "vulnerability_id": "VCID-4jnd-s39x-a3e5", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60637", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60711", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6089", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60786", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60843", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60805", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60831", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6074", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60706", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6077", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60794", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.6078", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60761", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60809", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60781", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60795", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60787", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00401", "scoring_system": "epss", "scoring_elements": "0.60738", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35638" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016127", "reference_id": "2016127", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016127" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35638" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jnd-s39x-a3e5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79986?format=api", "vulnerability_id": "VCID-4wes-5yrc-wkcc", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35641.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016130", "reference_id": "2016130", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016130" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35641" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4wes-5yrc-wkcc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79213?format=api", "vulnerability_id": "VCID-5587-7c63-xfgg", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21517", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35033", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3506", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3494", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34985", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34982", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34997", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34981", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59794", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59742", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.5979", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59851", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59807", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59834", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59898", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59779", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21517" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115285", "reference_id": "2115285", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115285" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21517" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5587-7c63-xfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79979?format=api", "vulnerability_id": "VCID-5hjv-8tfx-ckbx", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35634" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016121", "reference_id": "2016121", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016121" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:15Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35634" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjv-8tfx-ckbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79790?format=api", "vulnerability_id": "VCID-5ufm-419u-2qg3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21351.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21351", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62388", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62576", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6244", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62544", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62497", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62522", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62385", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6245", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62469", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62459", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.6248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62487", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62479", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62493", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21351" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043638", "reference_id": "2043638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043638" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21351" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ufm-419u-2qg3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79785?format=api", "vulnerability_id": "VCID-68eb-ae7g-tbcj", "summary": "mysql: Server: Parser unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51363", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5126", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51289", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21304" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043633", "reference_id": "2043633", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043633" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21304" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-68eb-ae7g-tbcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78927?format=api", "vulnerability_id": "VCID-69yx-qkan-d7d4", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79999", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.7993", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79946", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79942", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.7996", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79789", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79775", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79804", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79834", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.7981", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79838", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79839", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79842", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79878", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79894", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01312", "scoring_system": "epss", "scoring_elements": "0.79908", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21600" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142864", "reference_id": "2142864", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142864" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-23T15:25:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21600" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69yx-qkan-d7d4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78929?format=api", "vulnerability_id": "VCID-6ufw-3gfn-5ygm", "summary": "mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21605", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.67045", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66986", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66957", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66981", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66937", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66905", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21605" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142866", "reference_id": "2142866", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142866" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21605" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufw-3gfn-5ygm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78739?format=api", "vulnerability_id": "VCID-7g35-wex8-dygz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6299", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65255", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65177", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.652", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65114", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65112", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65122", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65134", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65118", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65165", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65208", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21866" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162273", "reference_id": "2162273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162273" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2023-21866" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7g35-wex8-dygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79495?format=api", "vulnerability_id": "VCID-7r77-wwtj-bbgs", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59305", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59464", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5935", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59407", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59365", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59393", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59328", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59293", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59344", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59376", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59359", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59341", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59361", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59339", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59343", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59302", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21417" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082640", "reference_id": "2082640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082640" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21417" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7r77-wwtj-bbgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79218?format=api", "vulnerability_id": "VCID-7wzz-nva6-yqaz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21528", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21528" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115290", "reference_id": "2115290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115290" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21528" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7wzz-nva6-yqaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79509?format=api", "vulnerability_id": "VCID-8fkf-84dd-7ya2", "summary": "mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01", "scoring_system": "epss", "scoring_elements": "0.77105", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01", "scoring_system": "epss", "scoring_elements": "0.77122", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01", "scoring_system": "epss", "scoring_elements": "0.77117", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01", "scoring_system": "epss", "scoring_elements": "0.77066", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01", "scoring_system": "epss", "scoring_elements": "0.77096", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01", "scoring_system": "epss", "scoring_elements": "0.77171", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83046", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.8308", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83083", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83106", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83113", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.8312", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83041", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.82994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83004", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83029", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01859", "scoring_system": "epss", "scoring_elements": "0.83052", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21457" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082654", "reference_id": "2082654", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082654" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:03Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21457" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkf-84dd-7ya2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79975?format=api", "vulnerability_id": "VCID-8m18-147e-4ka4", "summary": "mysql: Server: Options unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35630.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35630", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61826", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61677", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61787", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61743", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61772", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61731", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61719", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61699", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.6174", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61746", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61729", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61723", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61739", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00416", "scoring_system": "epss", "scoring_elements": "0.61732", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35630" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016117", "reference_id": "2016117", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016117" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35630" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8m18-147e-4ka4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79783?format=api", "vulnerability_id": "VCID-8mnm-4cgf-2bbt", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21302.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21302", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63449", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63647", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63525", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63534", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63507", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63551", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63603", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63569", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63595", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63476", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63441", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63492", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6351", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63527", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6352", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63506", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21302" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043631", "reference_id": "2043631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043631" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:41Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21302" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8mnm-4cgf-2bbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79501?format=api", "vulnerability_id": "VCID-8t59-zf4q-afgb", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21436", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57588", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57484", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57547", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57496", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57522", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57489", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57439", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21436" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082646", "reference_id": "2082646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082646" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:20Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21436" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8t59-zf4q-afgb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79221?format=api", "vulnerability_id": "VCID-8tpm-5kqs-efhd", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21531" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115293", "reference_id": "2115293", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115293" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21531" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpm-5kqs-efhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79500?format=api", "vulnerability_id": "VCID-9851-8zjc-zfgf", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21435", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45184", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45123", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4514", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45082", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45109", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45161", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45058", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21435" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082645", "reference_id": "2082645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082645" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21435" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9851-8zjc-zfgf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79493?format=api", "vulnerability_id": "VCID-9fvk-eqmz-zfcz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21414", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44165", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44035", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44113", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4413", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44067", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44098", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57489", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21414" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082638", "reference_id": "2082638", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082638" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21414" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvk-eqmz-zfcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79779?format=api", "vulnerability_id": "VCID-9su2-mawm-8ued", "summary": "mysql: Server: Federated unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21270.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21270", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51363", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5126", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51289", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21270" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043627", "reference_id": "2043627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043627" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21270" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9su2-mawm-8ued" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79965?format=api", "vulnerability_id": "VCID-ac7j-w1pc-z3h2", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35610.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35610", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73167", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73177", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73394", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73264", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73265", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.733", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73313", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73311", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73305", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73331", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73337", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73197", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73172", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73222", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73247", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73228", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73221", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35610" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016106", "reference_id": "2016106", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016106" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:33Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35610" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ac7j-w1pc-z3h2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79214?format=api", "vulnerability_id": "VCID-ae8p-nu59-mfb2", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47919", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47961", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47941", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47942", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47937", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47948", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.48002", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00247", "scoring_system": "epss", "scoring_elements": "0.47997", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70964", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70945", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70984", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71021", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70987", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71014", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71068", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.709", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70954", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70962", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21522" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115286", "reference_id": "2115286", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115286" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21522" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ae8p-nu59-mfb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79988?format=api", "vulnerability_id": "VCID-afgm-qfjk-77h2", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54905", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54856", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35643" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016132", "reference_id": "2016132", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016132" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35643" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-afgm-qfjk-77h2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79982?format=api", "vulnerability_id": "VCID-bbzn-prse-7fhm", "summary": "mysql: Server: PS unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35637.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35637", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44044", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43991", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44009", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43947", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43976", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.4423", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44234", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44251", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44218", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44278", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44196", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44118", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44122", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.44038", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00216", "scoring_system": "epss", "scoring_elements": "0.43915", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35637" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016126", "reference_id": "2016126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016126" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35637" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bbzn-prse-7fhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79987?format=api", "vulnerability_id": "VCID-bcv2-xfb3-4ker", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35642.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35642", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54905", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54856", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35642" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016131", "reference_id": "2016131", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016131" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35642" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bcv2-xfb3-4ker" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79798?format=api", "vulnerability_id": "VCID-bf13-qnc8-gkeh", "summary": "mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21374.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21374", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48189", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48116", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48085", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48114", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48051", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21374" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043646", "reference_id": "2043646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043646" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21374" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf13-qnc8-gkeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79223?format=api", "vulnerability_id": "VCID-bk52-etdq-8bgt", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21537" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115295", "reference_id": "2115295", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115295" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21537" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bk52-etdq-8bgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79958?format=api", "vulnerability_id": "VCID-byru-kqru-gfe6", "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59899", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59977", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60145", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60071", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60056", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60027", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60044", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60032", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59992", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60039", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60096", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60055", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60083", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60002", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60023", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60042", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60064", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35591" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016097", "reference_id": "2016097", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016097" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:44Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35591" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-byru-kqru-gfe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79217?format=api", "vulnerability_id": "VCID-cehv-gwcs-eudz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21527", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21527" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115289", "reference_id": "2115289", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:24Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21527" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cehv-gwcs-eudz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79507?format=api", "vulnerability_id": "VCID-cesc-kr1b-cugn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21452", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57588", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57484", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57547", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57496", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57522", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57489", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57439", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21452" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082652", "reference_id": "2082652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082652" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21452" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cesc-kr1b-cugn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79227?format=api", "vulnerability_id": "VCID-ctj6-46ju-ybaa", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55878", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55871", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55816", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55791", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55733", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55837", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55818", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58908", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58871", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58909", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58885", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58891", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21553" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115299", "reference_id": "2115299", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21553" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctj6-46ju-ybaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79797?format=api", "vulnerability_id": "VCID-d3c8-yxse-gqa1", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32321", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31667", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31657", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31731", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31737", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31645", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32231", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32259", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.3226", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32222", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32225", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32203", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32175", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.32013", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31885", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00128", "scoring_system": "epss", "scoring_elements": "0.31804", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043645", "reference_id": "2043645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043645" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21372" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d3c8-yxse-gqa1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79498?format=api", "vulnerability_id": "VCID-dbat-jj2y-sqbw", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.598", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59966", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59851", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59813", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59917", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59901", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59824", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59859", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.5988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59864", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59845", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59883", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.5989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00387", "scoring_system": "epss", "scoring_elements": "0.59875", "published_at": "2026-05-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21425" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082643", "reference_id": "2082643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082643" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:33Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21425" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dbat-jj2y-sqbw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79503?format=api", "vulnerability_id": "VCID-e33p-spt4-33bn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57502", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57588", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57484", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57547", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57496", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57522", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57523", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57552", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57556", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57532", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57491", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.5751", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57489", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00351", "scoring_system": "epss", "scoring_elements": "0.57439", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21438" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082648", "reference_id": "2082648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082648" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21438" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e33p-spt4-33bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79781?format=api", "vulnerability_id": "VCID-e8ge-ejs7-7ben", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21297.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21297", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39285", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39213", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39325", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.392", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21297" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043629", "reference_id": "2043629", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043629" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21297" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ge-ejs7-7ben" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79513?format=api", "vulnerability_id": "VCID-esze-5kfz-sfea", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56019", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55939", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55986", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56047", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55997", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56054", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56084", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56099", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56076", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56059", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56093", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56067", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55993", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.56013", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00331", "scoring_system": "epss", "scoring_elements": "0.55989", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082658", "reference_id": "2082658", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082658" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21478" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-esze-5kfz-sfea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79499?format=api", "vulnerability_id": "VCID-ezwh-q7de-abey", "summary": "mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22015", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21883", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.2179", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21863", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21941", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21911", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21934", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22261", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22044", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22124", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22179", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22159", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22099", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22046", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.21895", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644", "reference_id": "2082644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082644" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21427" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79512?format=api", "vulnerability_id": "VCID-f6px-shha-wqcn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21462", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44345", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44165", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44113", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4413", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44067", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44098", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44367", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44304", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44355", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4436", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44378", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44391", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44321", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44234", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44237", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44156", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44035", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21462" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082657", "reference_id": "2082657", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082657" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:57Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21462" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6px-shha-wqcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79497?format=api", "vulnerability_id": "VCID-fjxp-kyqj-7fgp", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45184", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45058", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45123", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4514", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45082", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45109", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54245", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54278", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54322", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54255", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.54214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00311", "scoring_system": "epss", "scoring_elements": "0.5422", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082642", "reference_id": "2082642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082642" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21423" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fjxp-kyqj-7fgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79775?format=api", "vulnerability_id": "VCID-g6f6-1du9-ufhz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21254.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21254", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78555", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78428", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78436", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78451", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78465", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.7849", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78506", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78502", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78517", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78336", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78394", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78376", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78369", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01135", "scoring_system": "epss", "scoring_elements": "0.78397", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21254" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043623", "reference_id": "2043623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043623" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21254" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g6f6-1du9-ufhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79977?format=api", "vulnerability_id": "VCID-gk57-6tsn-4yhs", "summary": "mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3087", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30999", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30435", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30414", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30421", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30345", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30368", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.31047", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30865", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30923", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30953", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30956", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.309", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.3088", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30846", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30683", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30567", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30483", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00119", "scoring_system": "epss", "scoring_elements": "0.30342", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35632" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016119", "reference_id": "2016119", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016119" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35632" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gk57-6tsn-4yhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79219?format=api", "vulnerability_id": "VCID-gs25-yymm-e3ak", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21529" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115291", "reference_id": "2115291", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:22Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21529" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs25-yymm-e3ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79795?format=api", "vulnerability_id": "VCID-gu2a-fwhq-pqhs", "summary": "mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38707", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38683", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38697", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3861", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38633", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39167", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39141", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39157", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39169", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39132", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39113", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39168", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39137", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39049", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3884", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38817", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38733", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.38609", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21368" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043643", "reference_id": "2043643", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043643" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21368" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gu2a-fwhq-pqhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79778?format=api", "vulnerability_id": "VCID-gwce-mjav-abcz", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43262", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.4334", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43344", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43267", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43136", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43212", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43229", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43168", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43199", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43389", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.4344", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43454", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43472", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43441", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43426", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43474", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43409", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21265" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043626", "reference_id": "2043626", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043626" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21265" ], "risk_score": 1.7, "exploitability": "0.5", "weighted_severity": "3.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwce-mjav-abcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79985?format=api", "vulnerability_id": "VCID-hhep-s9mq-6kbb", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35640.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30468", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30496", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30027", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.29993", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30002", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.29932", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.29954", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30542", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30353", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30413", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30448", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30449", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30406", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30374", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30356", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30312", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30251", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30059", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.29921", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016129", "reference_id": "2016129", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016129" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35640" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hhep-s9mq-6kbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79229?format=api", "vulnerability_id": "VCID-hv87-q417-8qd3", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61757", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61742", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61713", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61698", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61796", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61708", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61702", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61646", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61693", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.6169", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.6511", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65076", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65066", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65129", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65148", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65138", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65146", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00481", "scoring_system": "epss", "scoring_elements": "0.65156", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21569" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115301", "reference_id": "2115301", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115301" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21569" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hv87-q417-8qd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79966?format=api", "vulnerability_id": "VCID-hwf4-mqxw-4ycq", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35612.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35612", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59335", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59495", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5938", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59438", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59397", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59423", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59358", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59375", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59388", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59407", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59391", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59412", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59393", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5937", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5939", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59374", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59332", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35612" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016107", "reference_id": "2016107", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016107" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:31Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35612" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hwf4-mqxw-4ycq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79955?format=api", "vulnerability_id": "VCID-jkxq-q4u2-6fb6", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35575.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60158", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60234", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60396", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60321", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60328", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60314", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60285", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60301", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60245", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60351", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60308", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60336", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.6026", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60228", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60277", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60292", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60313", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60299", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60281", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35575" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016094", "reference_id": "2016094", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016094" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:51Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35575" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jkxq-q4u2-6fb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79216?format=api", "vulnerability_id": "VCID-jvss-882h-63bb", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21526", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4156", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41513", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41563", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41593", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41546", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41591", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59779", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59794", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71068", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70984", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71021", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70987", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.71014", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00651", "scoring_system": "epss", "scoring_elements": "0.70945", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21526" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115288", "reference_id": "2115288", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115288" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21526" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvss-882h-63bb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79969?format=api", "vulnerability_id": "VCID-k1mw-4auu-v7em", "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.5354", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53428", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53481", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53444", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53469", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53421", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.5339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53442", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53438", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.5347", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53454", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53491", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53477", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53462", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53424", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00301", "scoring_system": "epss", "scoring_elements": "0.53379", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35624" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016110", "reference_id": "2016110", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016110" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://usn.ubuntu.com/5123-2/", "reference_id": "USN-5123-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35624" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1mw-4auu-v7em" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78930?format=api", "vulnerability_id": "VCID-k26n-5mxy-w7ak", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6498", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64865", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64861", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64841", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64889", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64933", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64903", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64923", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66917", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66895", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21607" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142867", "reference_id": "2142867", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142867" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21607" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k26n-5mxy-w7ak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79978?format=api", "vulnerability_id": "VCID-k37x-pg16-bqbb", "summary": "mysql: Server: Logging unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40135", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40286", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39891", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39859", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39878", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39798", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.3982", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40311", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40285", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40297", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40309", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40272", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40252", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40299", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40268", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40192", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40017", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.40003", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39921", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39793", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35633" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016120", "reference_id": "2016120", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016120" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35633" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k37x-pg16-bqbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79989?format=api", "vulnerability_id": "VCID-kg95-ffr7-fkh8", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35644.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35644", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35644" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016133", "reference_id": "2016133", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016133" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:05Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35644" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kg95-ffr7-fkh8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79505?format=api", "vulnerability_id": "VCID-krjf-4xbf-s3dd", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21444", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58602", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58491", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58549", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58503", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58531", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58466", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58518", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58541", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58521", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58534", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58539", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58484", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58495", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58483", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00365", "scoring_system": "epss", "scoring_elements": "0.58448", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21444" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082650", "reference_id": "2082650", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082650" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:15Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21444" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-krjf-4xbf-s3dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78745?format=api", "vulnerability_id": "VCID-m997-zjm1-uffn", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21872", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.6299", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00436", "scoring_system": "epss", "scoring_elements": "0.62962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65255", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65177", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.652", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65033", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65082", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65114", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65076", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65112", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65105", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65122", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65134", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65118", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65165", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0048", "scoring_system": "epss", "scoring_elements": "0.65208", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21872" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162279", "reference_id": "2162279", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2023-21872" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m997-zjm1-uffn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79220?format=api", "vulnerability_id": "VCID-mq1t-yqxh-rkhv", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21530", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60399", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60289", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60305", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60293", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60248", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60295", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60311", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00393", "scoring_system": "epss", "scoring_elements": "0.60339", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63299", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63368", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63385", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63369", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63332", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63306", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63333", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21530" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115292", "reference_id": "2115292", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115292" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21530" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mq1t-yqxh-rkhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79504?format=api", "vulnerability_id": "VCID-nh7n-qv9q-8bda", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50976", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51005", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50937", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50988", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51019", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51064", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51083", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5111", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51045", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21440" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082649", "reference_id": "2082649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082649" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21440" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nh7n-qv9q-8bda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79800?format=api", "vulnerability_id": "VCID-nn19-u26n-6qdd", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21379.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21379", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5013", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.49992", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50047", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50028", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50058", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50075", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50129", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5014", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50155", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5012", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50073", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043648", "reference_id": "2043648", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043648" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21379" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn19-u26n-6qdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79791?format=api", "vulnerability_id": "VCID-npk1-jstp-bkc7", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52552", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52672", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.5256", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52605", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52569", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52595", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52579", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52546", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52597", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52591", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52625", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52611", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52649", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52656", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52641", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52592", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52603", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52566", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00293", "scoring_system": "epss", "scoring_elements": "0.52507", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21352" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043639", "reference_id": "2043639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043639" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21352" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-npk1-jstp-bkc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79952?format=api", "vulnerability_id": "VCID-nprc-6br4-gfdj", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2481.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2481", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0066", "scoring_system": "epss", "scoring_elements": "0.71297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.7138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71453", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71504", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71511", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71515", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71503", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71539", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71575", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71541", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71571", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71388", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71433", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71456", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.7144", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71422", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00674", "scoring_system": "epss", "scoring_elements": "0.71473", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2481" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016091", "reference_id": "2016091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016091" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2481" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nprc-6br4-gfdj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78939?format=api", "vulnerability_id": "VCID-p2hz-hqhw-zqhk", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64747", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64959", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64869", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64913", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64882", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64904", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64775", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64738", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64802", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64819", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64808", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64779", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64817", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64815", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64832", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64845", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64841", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64822", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21638" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142876", "reference_id": "2142876", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142876" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:44Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21638" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p2hz-hqhw-zqhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79786?format=api", "vulnerability_id": "VCID-p341-9tza-nkcs", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21339.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21339", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59883", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5976", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59763", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59726", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59774", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59836", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59792", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59819", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59789", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21339" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043634", "reference_id": "2043634", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043634" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21339" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p341-9tza-nkcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79964?format=api", "vulnerability_id": "VCID-pq5z-fp69-sufy", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.57978", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58062", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58175", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58121", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58122", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58097", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58063", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58077", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58022", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58124", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58076", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58105", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58084", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58059", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58113", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58133", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.5811", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016105", "reference_id": "2016105", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016105" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35608" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pq5z-fp69-sufy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79967?format=api", "vulnerability_id": "VCID-pw3f-uc38-5qcb", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.4588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.4587", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45811", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.4583", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45772", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45798", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45948", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45896", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45952", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45949", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45972", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45944", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.46003", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45998", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45895", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45906", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45848", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45747", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35622" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016108", "reference_id": "2016108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016108" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:27Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35622" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pw3f-uc38-5qcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79956?format=api", "vulnerability_id": "VCID-q2q2-ubam-fbh9", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35577.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35577", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.53998", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54016", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54155", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54083", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54056", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54005", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54047", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54102", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5406", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54086", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54019", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54117", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54099", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54082", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54121", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35577" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016095", "reference_id": "2016095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016095" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:50Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35577" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2q2-ubam-fbh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79776?format=api", "vulnerability_id": "VCID-q4rs-91hh-yfe7", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21256.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41101", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41005", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41076", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41094", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.40999", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00195", "scoring_system": "epss", "scoring_elements": "0.41025", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58191", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5819", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58227", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21256" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043624", "reference_id": "2043624", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043624" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:08Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21256" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4rs-91hh-yfe7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79950?format=api", "vulnerability_id": "VCID-qbyx-gq4t-rkhd", "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2478.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61805", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.6206", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61979", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61983", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61965", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61963", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.6198", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61972", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61917", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61964", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.62025", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.62006", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.6191", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.6193", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61969", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61957", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0042", "scoring_system": "epss", "scoring_elements": "0.61937", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2478" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016089", "reference_id": "2016089", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016089" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2478" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbyx-gq4t-rkhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79772?format=api", "vulnerability_id": "VCID-qhmn-p8zd-9qeh", "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21245.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21245", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39078", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38635", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38979", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38771", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38747", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38659", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38537", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.3861", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38624", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.38561", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39097", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39068", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39083", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39096", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39059", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39093", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39063", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21245" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043620", "reference_id": "2043620", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043620" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:17Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21245" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qhmn-p8zd-9qeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79514?format=api", "vulnerability_id": "VCID-qp52-bkgp-bbfu", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53467", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53601", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53489", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53541", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53504", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.5353", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53493", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53462", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53514", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.5351", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53525", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.5356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53486", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00302", "scoring_system": "epss", "scoring_elements": "0.53441", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21479" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082659", "reference_id": "2082659", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082659" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:45Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21479" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qp52-bkgp-bbfu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79496?format=api", "vulnerability_id": "VCID-qqbf-2xy3-k3bs", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21418", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3598", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.35958", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.35979", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.35889", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.35912", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3641", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3643", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3638", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36421", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36404", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36125", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36095", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.36008", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00156", "scoring_system": "epss", "scoring_elements": "0.3589", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082641", "reference_id": "2082641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082641" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21418" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqbf-2xy3-k3bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79226?format=api", "vulnerability_id": "VCID-qra2-ejj6-sqgv", "summary": "mysql: Server: Federated unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55878", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55871", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55797", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55816", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55791", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55733", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.5578", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55837", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55818", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58908", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58871", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58905", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58909", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58842", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58833", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58885", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0037", "scoring_system": "epss", "scoring_elements": "0.58891", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21547" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115298", "reference_id": "2115298", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115298" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21547" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qra2-ejj6-sqgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79954?format=api", "vulnerability_id": "VCID-qtjn-m9ak-6ye1", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67451", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67429", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.6746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67459", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67434", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67478", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67516", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67488", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67512", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67385", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67415", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67449", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67403", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35546" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016093", "reference_id": "2016093", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016093" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:01Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35546" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qtjn-m9ak-6ye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78265?format=api", "vulnerability_id": "VCID-r33z-et19-mfa8", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jul 2023)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21950.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21950", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38758", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38763", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38273", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38343", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38354", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38265", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.3829", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.3878", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38769", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38781", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38717", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38742", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38662", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38505", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.3848", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38391", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00185", "scoring_system": "epss", "scoring_elements": "0.39871", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-21950" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819", "reference_id": "1041819", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041819" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224209", "reference_id": "2224209", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224209" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2023.html", "reference_id": "cpujul2023.html", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-13T17:57:36Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujul2023.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2023-21950" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r33z-et19-mfa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79984?format=api", "vulnerability_id": "VCID-r4jk-v7qa-nkf9", "summary": "mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35639.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35639", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34671", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34415", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34385", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34425", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3432", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34347", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34914", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34791", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34835", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34869", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34831", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34807", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34845", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34784", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34547", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34527", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3444", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34315", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35639" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016128", "reference_id": "2016128", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016128" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35639" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r4jk-v7qa-nkf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79961?format=api", "vulnerability_id": "VCID-rhr1-hje4-2qe6", "summary": "mysql: Server: Options unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35602.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35602", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45062", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45027", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45194", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45146", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45059", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45066", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45007", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.44902", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.44969", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.44986", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.44927", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.44953", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45107", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.4516", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45181", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45149", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00224", "scoring_system": "epss", "scoring_elements": "0.45201", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35602" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016100", "reference_id": "2016100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016100" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:39Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35602" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rhr1-hje4-2qe6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79787?format=api", "vulnerability_id": "VCID-rjhp-4nxn-zya4", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39285", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.392", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39213", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21342" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043635", "reference_id": "2043635", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043635" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:24Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21342" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rjhp-4nxn-zya4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79491?format=api", "vulnerability_id": "VCID-rqm1-abez-ska4", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082636", "reference_id": "2082636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082636" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:41Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21412" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqm1-abez-ska4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79796?format=api", "vulnerability_id": "VCID-ruz5-9rez-77gq", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39285", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39213", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39325", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.392", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043644", "reference_id": "2043644", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043644" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21370" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ruz5-9rez-77gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79508?format=api", "vulnerability_id": "VCID-s1cy-v2fk-kua7", "summary": "mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21454", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.6057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60751", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60653", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60646", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60703", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.6069", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60599", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60568", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60632", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60657", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60642", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60663", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60669", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60641", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21454" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082653", "reference_id": "2082653", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082653" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:06Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21454" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cy-v2fk-kua7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78937?format=api", "vulnerability_id": "VCID-sc1z-ry96-duc7", "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.7182", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.72036", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71955", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71986", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.7195", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71978", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71839", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71812", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71862", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71886", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71868", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71894", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71899", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71883", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71928", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.71932", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.7193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00693", "scoring_system": "epss", "scoring_elements": "0.7192", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21635" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142874", "reference_id": "2142874", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142874" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21635" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sc1z-ry96-duc7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79511?format=api", "vulnerability_id": "VCID-sg3r-6972-uyfz", "summary": "mysql: Server: Logging unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21460", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57074", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57062", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.5698", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57026", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57088", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57037", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57125", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57127", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57139", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57118", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57121", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57099", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57031", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00345", "scoring_system": "epss", "scoring_elements": "0.57049", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21460" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082656", "reference_id": "2082656", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082656" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:00Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21460" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3r-6972-uyfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79972?format=api", "vulnerability_id": "VCID-svv4-xj5y-5uad", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35627.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35627", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63033", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63203", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63255", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63215", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63242", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63086", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63155", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63135", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.6317", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63177", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63179", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63194", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63193", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00439", "scoring_system": "epss", "scoring_elements": "0.63159", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35627" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016113", "reference_id": "2016113", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016113" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:22Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35627" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svv4-xj5y-5uad" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79959?format=api", "vulnerability_id": "VCID-syty-vyfp-yygc", "summary": "mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35596.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35596", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.53998", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54016", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54155", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54083", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54056", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54005", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54047", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54102", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5406", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54086", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54042", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54019", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5407", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54117", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54099", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54082", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54121", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35596" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016098", "reference_id": "2016098", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016098" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35596" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-syty-vyfp-yygc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79794?format=api", "vulnerability_id": "VCID-t6dn-wg6k-1ue6", "summary": "mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39285", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39213", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39325", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.392", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21367" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043642", "reference_id": "2043642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043642" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:10Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21367" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t6dn-wg6k-1ue6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79951?format=api", "vulnerability_id": "VCID-t6rb-2f2t-h7g3", "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67362", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67439", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67451", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67429", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.6746", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67459", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67434", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67478", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67516", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67488", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67512", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67385", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67363", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67415", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67428", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67449", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67437", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67403", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-2479" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016090", "reference_id": "2016090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016090" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-2479" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t6rb-2f2t-h7g3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79963?format=api", "vulnerability_id": "VCID-tatx-17xb-1qe1", "summary": "mysql: Server: DML unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35607.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35607", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52768", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.529", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52869", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52853", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52821", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52831", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52793", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52738", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52789", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52833", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.528", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52826", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52762", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52813", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52807", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52825", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00295", "scoring_system": "epss", "scoring_elements": "0.52862", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35607" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016104", "reference_id": "2016104", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016104" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:36Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35607" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tatx-17xb-1qe1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79506?format=api", "vulnerability_id": "VCID-tawp-6a7d-fycz", "summary": "mysql: InnoDB unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21451", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46276", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46272", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46209", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4623", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4617", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.462", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46295", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46242", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46297", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46321", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46293", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46302", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46355", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46299", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46281", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46292", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46238", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46144", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21451" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082651", "reference_id": "2082651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082651" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" }, { "reference_url": "https://usn.ubuntu.com/5400-2/", "reference_id": "USN-5400-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21451" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79225?format=api", "vulnerability_id": "VCID-tupa-3adt-33hf", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60548", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60437", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60451", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60398", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60444", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60503", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.6046", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60487", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64028", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64034", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64046", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.63963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.6403", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00458", "scoring_system": "epss", "scoring_elements": "0.64003", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21539" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115297", "reference_id": "2115297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21539" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tupa-3adt-33hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79971?format=api", "vulnerability_id": "VCID-twrq-tvwe-xkd1", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35626.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54905", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54856", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35626" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016112", "reference_id": "2016112", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016112" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35626" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twrq-tvwe-xkd1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79494?format=api", "vulnerability_id": "VCID-txsg-dega-4fcs", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21415", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45184", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45123", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4514", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45082", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45109", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45161", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45058", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21415" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082639", "reference_id": "2082639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082639" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:38Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21415" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txsg-dega-4fcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79224?format=api", "vulnerability_id": "VCID-u26p-pxhd-6fhm", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50214", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50225", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50197", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50203", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50157", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50074", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50127", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50156", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50109", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00267", "scoring_system": "epss", "scoring_elements": "0.50138", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57661", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.5769", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57686", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57632", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57684", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57702", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00353", "scoring_system": "epss", "scoring_elements": "0.57654", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21538" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115296", "reference_id": "2115296", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21538" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u26p-pxhd-6fhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79992?format=api", "vulnerability_id": "VCID-u8m3-6w1s-gyca", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35647.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35647", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54905", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54856", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35647" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016137", "reference_id": "2016137", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016137" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:02Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35647" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8m3-6w1s-gyca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79789?format=api", "vulnerability_id": "VCID-uh48-944q-zbdx", "summary": "mysql: InnoDB unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21348.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21348", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48189", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48116", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48085", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48114", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48051", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21348" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043637", "reference_id": "2043637", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043637" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:21Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21348" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh48-944q-zbdx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79212?format=api", "vulnerability_id": "VCID-ujcd-zae5-fkc3", "summary": "mysql: Server: Options unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21515", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57558", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57503", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57461", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.5748", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57459", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57409", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57454", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57516", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57466", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0035", "scoring_system": "epss", "scoring_elements": "0.57492", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73085", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73098", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73122", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73102", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73096", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73139", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73148", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73053", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00748", "scoring_system": "epss", "scoring_elements": "0.73074", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21515" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115284", "reference_id": "2115284", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115284" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://usn.ubuntu.com/5537-2/", "reference_id": "USN-5537-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21515" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcd-zae5-fkc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79774?format=api", "vulnerability_id": "VCID-ukyc-ycpk-6ff1", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58191", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58305", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58227", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5819", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58153", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58195", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58256", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58207", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58236", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58211", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58183", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.5826", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58237", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58218", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58249", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00361", "scoring_system": "epss", "scoring_elements": "0.58252", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21253" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043622", "reference_id": "2043622", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043622" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21253" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ukyc-ycpk-6ff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79211?format=api", "vulnerability_id": "VCID-umkj-5zap-zkgk", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21509", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44652", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4465", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44673", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44707", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49051", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49142", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49091", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49193", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49179", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49169", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49178", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49135", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49115", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00258", "scoring_system": "epss", "scoring_elements": "0.49118", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21509" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115283", "reference_id": "2115283", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:40Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21509" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-umkj-5zap-zkgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78941?format=api", "vulnerability_id": "VCID-vyqe-sag1-c3gm", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21641", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.64084", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63993", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.64039", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.64006", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.64032", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63879", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.6393", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63947", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.6396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63946", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63913", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63948", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63958", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63966", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63979", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63977", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63949", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21641" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142878", "reference_id": "2142878", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142878" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21641" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vyqe-sag1-c3gm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79510?format=api", "vulnerability_id": "VCID-w1m7-xnmp-cyet", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21459", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50976", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51005", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50937", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.50988", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51019", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51064", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5106", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51104", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51083", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.5111", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51037", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00276", "scoring_system": "epss", "scoring_elements": "0.51045", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21459" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082655", "reference_id": "2082655", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082655" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21459" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1m7-xnmp-cyet" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79792?format=api", "vulnerability_id": "VCID-wkz5-36y5-k7f7", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21358.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21358", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51057", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51037", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.50968", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51019", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.5105", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51007", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51082", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51038", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51095", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51091", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51135", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51114", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51136", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51142", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51119", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51067", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51075", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00277", "scoring_system": "epss", "scoring_elements": "0.51035", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21358" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043640", "reference_id": "2043640", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043640" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:14Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21358" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkz5-36y5-k7f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79788?format=api", "vulnerability_id": "VCID-wm2n-ww3b-qkfp", "summary": "mysql: Server: Replication unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21344.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21344", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39699", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39285", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39281", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39189", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39213", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39722", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.3964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39716", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39603", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39424", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39408", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.39325", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0018", "scoring_system": "epss", "scoring_elements": "0.392", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21344" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043636", "reference_id": "2043636", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043636" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:23Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" }, { "reference_url": "https://usn.ubuntu.com/5270-2/", "reference_id": "USN-5270-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21344" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wm2n-ww3b-qkfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78925?format=api", "vulnerability_id": "VCID-wt5d-srfd-3qhc", "summary": "mysql: C API unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21595.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21595", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33628", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33506", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33576", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33618", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33529", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33552", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34249", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34112", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34155", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34141", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34117", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34106", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33734", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33711", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.33625", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21595" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142862", "reference_id": "2142862", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142862" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:13Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5759", "reference_id": "RHSA-2022:5759", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5759" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5826", "reference_id": "RHSA-2022:5826", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5826" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5948", "reference_id": "RHSA-2022:5948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6306", "reference_id": "RHSA-2022:6306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6443", "reference_id": "RHSA-2022:6443", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6443" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21595" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wt5d-srfd-3qhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/78923?format=api", "vulnerability_id": "VCID-wuuw-gec8-7fh2", "summary": "mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21592", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61107", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61278", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61173", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61233", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61194", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61221", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61135", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61101", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61149", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61171", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61152", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61192", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61198", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61179", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61168", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61183", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61176", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00407", "scoring_system": "epss", "scoring_elements": "0.61124", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21592" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142860", "reference_id": "2142860", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142860" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20221028-0013/", "reference_id": "ntap-20221028-0013", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:16Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20221028-0013/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5696-1/", "reference_id": "USN-5696-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5696-1/" }, { "reference_url": "https://usn.ubuntu.com/5696-2/", "reference_id": "USN-5696-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5696-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21592" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wuuw-gec8-7fh2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79993?format=api", "vulnerability_id": "VCID-x1ya-zfn1-ebdd", "summary": "mysql: Server: FTS unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35648.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5474", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54811", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54905", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54856", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54816", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54842", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54834", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54854", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54863", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54845", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54813", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54758", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35648" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016138", "reference_id": "2016138", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016138" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35648" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x1ya-zfn1-ebdd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79228?format=api", "vulnerability_id": "VCID-x9ts-bdrn-ufha", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21556", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5553", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55514", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55438", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55457", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55431", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55382", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55426", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55483", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55443", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.5547", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59453", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59493", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59415", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59456", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59469", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59439", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21556" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115300", "reference_id": "2115300", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115300" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21556" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ts-bdrn-ufha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79777?format=api", "vulnerability_id": "VCID-y3ue-d94d-vygc", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21264.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51363", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5126", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51289", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59716", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59763", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59711", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59762", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59796", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.59789", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00385", "scoring_system": "epss", "scoring_elements": "0.5976", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21264" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043625", "reference_id": "2043625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043625" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:57Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21264" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y3ue-d94d-vygc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79215?format=api", "vulnerability_id": "VCID-y6n1-n99c-yfcu", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21525", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41593", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41513", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41563", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.4156", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41546", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41591", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00196", "scoring_system": "epss", "scoring_elements": "0.41566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59794", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59742", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.5979", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59851", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59807", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59834", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59898", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59776", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59779", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789", "reference_id": "1015789", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115287", "reference_id": "2115287", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2115287" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/", "reference_id": "3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5537-1/", "reference_id": "USN-5537-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5537-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/", "reference_id": "ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21525" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y6n1-n99c-yfcu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79502?format=api", "vulnerability_id": "VCID-yn56-p3gf-13gf", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45297", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45184", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45123", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.4514", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45082", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45109", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45305", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45353", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45161", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00225", "scoring_system": "epss", "scoring_elements": "0.45058", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082647", "reference_id": "2082647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082647" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005/", "reference_id": "ntap-20220429-0005", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:19Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6590", "reference_id": "RHSA-2022:6590", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5400-1/", "reference_id": "USN-5400-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5400-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21437" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yn56-p3gf-13gf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79970?format=api", "vulnerability_id": "VCID-yvvh-5fmy-hkau", "summary": "mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35625.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29549", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29616", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29099", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2906", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29075", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.28998", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29018", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29486", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29589", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.2951", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29483", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29323", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29209", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29144", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00111", "scoring_system": "epss", "scoring_elements": "0.29", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35625" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016111", "reference_id": "2016111", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016111" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:24Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-35625" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yvvh-5fmy-hkau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79773?format=api", "vulnerability_id": "VCID-zcn4-h4j5-qfat", "summary": "mysql: Server: DDL unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21249.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21249", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35463", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35609", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35577", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35491", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35375", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35445", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35467", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35372", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35396", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.36013", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35894", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35917", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35922", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35881", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35858", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35885", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35837", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21249" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043621", "reference_id": "2043621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043621" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "2.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:45:12Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21249" ], "risk_score": 1.2, "exploitability": "0.5", "weighted_severity": "2.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zcn4-h4j5-qfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79782?format=api", "vulnerability_id": "VCID-ze42-san9-aqdg", "summary": "mysql: Server: DML unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21301.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21301", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51363", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51346", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51293", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.513", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51207", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51258", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.5126", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51289", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51297", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51256", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51311", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51308", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51331", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51359", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51366", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21301" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043630", "reference_id": "2043630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043630" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/", "reference_id": "D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2XBX2PNTBLJNK5G7EP7LIDPFTPDIHPW/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/", "reference_id": "U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:42Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U6OB7IPXBSJRAGCA4P47EVGC76VS2DS4/" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21301" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ze42-san9-aqdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79799?format=api", "vulnerability_id": "VCID-zxdt-rp17-ebbu", "summary": "mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21378.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21378", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48164", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48189", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48116", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48139", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48085", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48114", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48185", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48188", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48207", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.4818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48243", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48238", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48194", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48176", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48186", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48133", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00249", "scoring_system": "epss", "scoring_elements": "0.48051", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-21378" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043647", "reference_id": "2043647", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043647" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220121-0008/", "reference_id": "ntap-20220121-0008", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:44:01Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220121-0008/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://usn.ubuntu.com/5270-1/", "reference_id": "USN-5270-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5270-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2022-21378" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zxdt-rp17-ebbu" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql80-mysql@8.0.30-1%3Farch=el7" }