{"url":"http://public2.vulnerablecode.io/api/packages/97273?format=json","purl":"pkg:rpm/redhat/mysql@8.0.30-3?arch=el9_0","type":"rpm","namespace":"redhat","name":"mysql","version":"8.0.30-3","qualifiers":{"arch":"el9_0"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79222?format=json","vulnerability_id":"VCID-2jks-ehmr-73aj","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21534","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115294","reference_id":"2115294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21534"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jks-ehmr-73aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79210?format=json","vulnerability_id":"VCID-3w7d-u3hs-x7fr","summary":"mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21455.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21455","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5547","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55495","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55497","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55537","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58048","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58083","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58049","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00359","scoring_system":"epss","scoring_elements":"0.58063","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21455"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115282","reference_id":"2115282","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115282"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21455"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3w7d-u3hs-x7fr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79492?format=json","vulnerability_id":"VCID-3zjk-18aa-9kbk","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21413.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21413","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21413"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082637","reference_id":"2082637","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082637"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21413"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3zjk-18aa-9kbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79213?format=json","vulnerability_id":"VCID-5587-7c63-xfgg","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21517.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21517","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35033","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3494","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34985","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34981","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21517"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115285","reference_id":"2115285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115285"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21517"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5587-7c63-xfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78929?format=json","vulnerability_id":"VCID-6ufw-3gfn-5ygm","summary":"mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21605.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21605","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66934","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66902","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21605"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142866","reference_id":"2142866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142866"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:10Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21605"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ufw-3gfn-5ygm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78739?format=json","vulnerability_id":"VCID-7g35-wex8-dygz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21866","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21866"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162273","reference_id":"2162273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2023-21866"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7g35-wex8-dygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79495?format=json","vulnerability_id":"VCID-7r77-wwtj-bbgs","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21417","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59343","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59374","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5938","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59328","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59293","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59341","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082640","reference_id":"2082640","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082640"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21417"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7r77-wwtj-bbgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79218?format=json","vulnerability_id":"VCID-7wzz-nva6-yqaz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21528","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21528"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115290","reference_id":"2115290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115290"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21528"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7wzz-nva6-yqaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79509?format=json","vulnerability_id":"VCID-8fkf-84dd-7ya2","summary":"mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21457","reference_id":"","reference_type":"","scores":[{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.82994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.8312","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.8308","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83083","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83106","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83113","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83007","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83004","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83029","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01859","scoring_system":"epss","scoring_elements":"0.83041","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21457"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082654","reference_id":"2082654","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082654"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:03Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21457"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fkf-84dd-7ya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79501?format=json","vulnerability_id":"VCID-8t59-zf4q-afgb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21436.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21436","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21436"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082646","reference_id":"2082646","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082646"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21436"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8t59-zf4q-afgb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79221?format=json","vulnerability_id":"VCID-8tpm-5kqs-efhd","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21531","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21531"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115293","reference_id":"2115293","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115293"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:20Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21531"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8tpm-5kqs-efhd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79500?format=json","vulnerability_id":"VCID-9851-8zjc-zfgf","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21435.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21435","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21435"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082645","reference_id":"2082645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082645"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:21Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21435"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9851-8zjc-zfgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79493?format=json","vulnerability_id":"VCID-9fvk-eqmz-zfcz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21414.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21414","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21414"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082638","reference_id":"2082638","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082638"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21414"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvk-eqmz-zfcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79214?format=json","vulnerability_id":"VCID-ae8p-nu59-mfb2","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21522","reference_id":"","reference_type":"","scores":[{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47919","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47941","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47961","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.48002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.709","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70954","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70962","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21522"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115286","reference_id":"2115286","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115286"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21522"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ae8p-nu59-mfb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79223?format=json","vulnerability_id":"VCID-bk52-etdq-8bgt","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21537","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21537"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115295","reference_id":"2115295","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115295"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:14Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21537"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk52-etdq-8bgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79217?format=json","vulnerability_id":"VCID-cehv-gwcs-eudz","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21527","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21527"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115289","reference_id":"2115289","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21527"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cehv-gwcs-eudz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79507?format=json","vulnerability_id":"VCID-cesc-kr1b-cugn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21452.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21452","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21452"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082652","reference_id":"2082652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082652"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21452"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cesc-kr1b-cugn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79227?format=json","vulnerability_id":"VCID-ctj6-46ju-ybaa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21553.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21553","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21553"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115299","reference_id":"2115299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21553"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctj6-46ju-ybaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79498?format=json","vulnerability_id":"VCID-dbat-jj2y-sqbw","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21425","reference_id":"","reference_type":"","scores":[{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.5988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00387","scoring_system":"epss","scoring_elements":"0.59864","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21425"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082643","reference_id":"2082643","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082643"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21425"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dbat-jj2y-sqbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79503?format=json","vulnerability_id":"VCID-e33p-spt4-33bn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21438","reference_id":"","reference_type":"","scores":[{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.5751","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57523","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57552","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57555","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00351","scoring_system":"epss","scoring_elements":"0.57529","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21438"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082648","reference_id":"2082648","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082648"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21438"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e33p-spt4-33bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79513?format=json","vulnerability_id":"VCID-esze-5kfz-sfea","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21478","reference_id":"","reference_type":"","scores":[{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56034","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56067","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.55993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56013","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56054","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56087","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56099","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56076","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00331","scoring_system":"epss","scoring_elements":"0.56093","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082658","reference_id":"2082658","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082658"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21478"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-esze-5kfz-sfea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79499?format=json","vulnerability_id":"VCID-ezwh-q7de-abey","summary":"mysql: Server: FTS unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21427","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21883","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22093","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22044","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22199","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21427"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082644","reference_id":"2082644","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082644"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:32Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6306","reference_id":"RHSA-2022:6306","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6306"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6443","reference_id":"RHSA-2022:6443","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6443"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"},{"reference_url":"https://usn.ubuntu.com/5739-1/","reference_id":"USN-5739-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5739-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21427"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwh-q7de-abey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79512?format=json","vulnerability_id":"VCID-f6px-shha-wqcn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21462.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21462","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44156","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44391","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44321","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44234","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44355","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44378","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44401","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21462"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082657","reference_id":"2082657","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082657"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:57Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21462"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6px-shha-wqcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79497?format=json","vulnerability_id":"VCID-fjxp-kyqj-7fgp","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21423","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21423"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082642","reference_id":"2082642","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082642"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:34Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21423"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjxp-kyqj-7fgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79219?format=json","vulnerability_id":"VCID-gs25-yymm-e3ak","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21529","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115291","reference_id":"2115291","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115291"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:22Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21529"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs25-yymm-e3ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79229?format=json","vulnerability_id":"VCID-hv87-q417-8qd3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21569.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21569","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61698","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65148","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.6511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65146","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00481","scoring_system":"epss","scoring_elements":"0.65115","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21569"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115301","reference_id":"2115301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21569"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hv87-q417-8qd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79216?format=json","vulnerability_id":"VCID-jvss-882h-63bb","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21526","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21526"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115288","reference_id":"2115288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115288"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21526"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jvss-882h-63bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78930?format=json","vulnerability_id":"VCID-k26n-5mxy-w7ak","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21607.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21607","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64861","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64865","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66899","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66895","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21607"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142867","reference_id":"2142867","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142867"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21607"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k26n-5mxy-w7ak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79505?format=json","vulnerability_id":"VCID-krjf-4xbf-s3dd","summary":"mysql: Server: DDL unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21444.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21444","reference_id":"","reference_type":"","scores":[{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58484","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58494","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58518","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58541","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00365","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082650","reference_id":"2082650","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082650"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21444"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-krjf-4xbf-s3dd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78745?format=json","vulnerability_id":"VCID-m997-zjm1-uffn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-21872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21872","reference_id":"","reference_type":"","scores":[{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.6299","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00436","scoring_system":"epss","scoring_elements":"0.62962","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65134","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65033","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65082","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65076","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65112","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-21872"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162279","reference_id":"2162279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2162279"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2023-21872"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m997-zjm1-uffn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79220?format=json","vulnerability_id":"VCID-mq1t-yqxh-rkhv","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21530.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21530","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60293","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60289","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63369","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63366","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63333","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63299","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63368","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63385","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21530"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115292","reference_id":"2115292","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115292"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21530"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mq1t-yqxh-rkhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79504?format=json","vulnerability_id":"VCID-nh7n-qv9q-8bda","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21440","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5111","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51066","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082649","reference_id":"2082649","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082649"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21440"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nh7n-qv9q-8bda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78939?format=json","vulnerability_id":"VCID-p2hz-hqhw-zqhk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21638.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21638","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64747","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64841","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64815","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64845","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64738","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64787","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64817","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21638"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142876","reference_id":"2142876","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142876"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21638"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2hz-hqhw-zqhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79514?format=json","vulnerability_id":"VCID-qp52-bkgp-bbfu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21479","reference_id":"","reference_type":"","scores":[{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53467","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53546","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53559","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53525","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21479"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082659","reference_id":"2082659","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082659"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T18:36:45Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21479"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qp52-bkgp-bbfu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79496?format=json","vulnerability_id":"VCID-qqbf-2xy3-k3bs","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21418","reference_id":"","reference_type":"","scores":[{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36488","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36404","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36095","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3641","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3643","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36402","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.3638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36421","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082641","reference_id":"2082641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082641"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21418"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqbf-2xy3-k3bs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79226?format=json","vulnerability_id":"VCID-qra2-ejj6-sqgv","summary":"mysql: Server: Federated unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21547","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55871","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55797","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58905","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0037","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21547"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115298","reference_id":"2115298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115298"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21547"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qra2-ejj6-sqgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79491?format=json","vulnerability_id":"VCID-rqm1-abez-ska4","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21412","reference_id":"","reference_type":"","scores":[{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63122","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63086","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63138","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63155","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63135","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082636","reference_id":"2082636","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082636"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:41Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21412"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rqm1-abez-ska4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79508?format=json","vulnerability_id":"VCID-s1cy-v2fk-kua7","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21454.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21454","reference_id":"","reference_type":"","scores":[{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.6057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60617","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60632","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00398","scoring_system":"epss","scoring_elements":"0.60621","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21454"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082653","reference_id":"2082653","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082653"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:06Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21454"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s1cy-v2fk-kua7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78937?format=json","vulnerability_id":"VCID-sc1z-ry96-duc7","summary":"mysql: InnoDB unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21635","reference_id":"","reference_type":"","scores":[{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.7193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71928","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71932","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71851","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71886","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00693","scoring_system":"epss","scoring_elements":"0.71894","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21635"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142874","reference_id":"2142874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142874"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21635"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sc1z-ry96-duc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79511?format=json","vulnerability_id":"VCID-sg3r-6972-uyfz","summary":"mysql: Server: Logging unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21460.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21460","reference_id":"","reference_type":"","scores":[{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57049","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57121","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57099","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57127","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57139","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00345","scoring_system":"epss","scoring_elements":"0.57118","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21460"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082656","reference_id":"2082656","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082656"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:00Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21460"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sg3r-6972-uyfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79506?format=json","vulnerability_id":"VCID-tawp-6a7d-fycz","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21451.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21451","reference_id":"","reference_type":"","scores":[{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46276","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46299","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46292","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46297","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46293","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46302","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46359","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21451"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082651","reference_id":"2082651","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082651"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"},{"reference_url":"https://usn.ubuntu.com/5400-2/","reference_id":"USN-5400-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21451"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tawp-6a7d-fycz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79225?format=json","vulnerability_id":"VCID-tupa-3adt-33hf","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21539.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21539","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60437","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60451","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.6403","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64042","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.63999","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64034","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00458","scoring_system":"epss","scoring_elements":"0.64046","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21539"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115297","reference_id":"2115297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115297"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21539"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tupa-3adt-33hf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79494?format=json","vulnerability_id":"VCID-txsg-dega-4fcs","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21415.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21415","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21415"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082639","reference_id":"2082639","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082639"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T17:43:38Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21415"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txsg-dega-4fcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79224?format=json","vulnerability_id":"VCID-u26p-pxhd-6fhm","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21538.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21538","reference_id":"","reference_type":"","scores":[{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50225","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50197","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57629","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5769","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57686","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21538"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115296","reference_id":"2115296","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115296"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21538"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u26p-pxhd-6fhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79212?format=json","vulnerability_id":"VCID-ujcd-zae5-fkc3","summary":"mysql: Server: Options unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21515.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21515","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57503","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5748","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73053","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73148","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73139","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73096","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73085","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00748","scoring_system":"epss","scoring_elements":"0.73122","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21515"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115284","reference_id":"2115284","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115284"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://usn.ubuntu.com/5537-2/","reference_id":"USN-5537-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:38Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21515"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ujcd-zae5-fkc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79211?format=json","vulnerability_id":"VCID-umkj-5zap-zkgk","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21509.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21509","reference_id":"","reference_type":"","scores":[{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44673","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44707","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49169","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49178","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21509"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115283","reference_id":"2115283","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21509"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-umkj-5zap-zkgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78941?format=json","vulnerability_id":"VCID-vyqe-sag1-c3gm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21641.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21641","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63948","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63958","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63966","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63979","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6393","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63913","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21641"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142878","reference_id":"2142878","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142878"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:20:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21641"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vyqe-sag1-c3gm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79510?format=json","vulnerability_id":"VCID-w1m7-xnmp-cyet","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21459.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21459","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51005","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5111","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51037","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51104","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51083","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51066","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21459"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082655","reference_id":"2082655","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082655"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21459"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w1m7-xnmp-cyet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78923?format=json","vulnerability_id":"VCID-wuuw-gec8-7fh2","summary":"mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21592","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61107","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61176","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61168","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61101","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61152","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61192","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21592"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142860","reference_id":"2142860","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142860"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0013/","reference_id":"ntap-20221028-0013","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T15:21:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5696-1/","reference_id":"USN-5696-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-1/"},{"reference_url":"https://usn.ubuntu.com/5696-2/","reference_id":"USN-5696-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5696-2/"}],"fixed_packages":[],"aliases":["CVE-2022-21592"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wuuw-gec8-7fh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79228?format=json","vulnerability_id":"VCID-x9ts-bdrn-ufha","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21556.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21556","reference_id":"","reference_type":"","scores":[{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55431","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55438","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59493","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21556"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115300","reference_id":"2115300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115300"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"}],"fixed_packages":[],"aliases":["CVE-2022-21556"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ts-bdrn-ufha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79215?format=json","vulnerability_id":"VCID-y6n1-n99c-yfcu","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21525","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41558","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41513","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41587","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41563","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41593","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4156","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41546","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41591","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59779","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789","reference_id":"1015789","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115287","reference_id":"2115287","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2115287"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/","reference_id":"3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CESCYUGY6H6O2R2GPUJLBTYSMY2PHCD/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5537-1/","reference_id":"USN-5537-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5537-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/","reference_id":"ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:07:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZI4Q7XW5QLUTOACRHBIEYZ6SZB6TIEMT/"}],"fixed_packages":[],"aliases":["CVE-2022-21525"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y6n1-n99c-yfcu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79502?format=json","vulnerability_id":"VCID-yn56-p3gf-13gf","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-21437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21437","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45353","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45221","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-21437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082647","reference_id":"2082647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082647"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220429-0005/","reference_id":"ntap-20220429-0005","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-24T14:08:19Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220429-0005/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6518","reference_id":"RHSA-2022:6518","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6518"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6590","reference_id":"RHSA-2022:6590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7119","reference_id":"RHSA-2022:7119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7119"},{"reference_url":"https://usn.ubuntu.com/5400-1/","reference_id":"USN-5400-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5400-1/"}],"fixed_packages":[],"aliases":["CVE-2022-21437"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yn56-p3gf-13gf"}],"fixing_vulnerabilities":[],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@8.0.30-3%3Farch=el9_0"}