{"url":"http://public2.vulnerablecode.io/api/packages/99892?format=json","purl":"pkg:rpm/redhat/rh-mysql80-mysql@8.0.26-1?arch=el7","type":"rpm","namespace":"redhat","name":"rh-mysql80-mysql","version":"8.0.26-1","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56998?format=json","vulnerability_id":"VCID-11tt-44je-dfg8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14775.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14775","reference_id":"","reference_type":"","scores":[{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.8067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80768","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14775"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890784","reference_id":"1890784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890784"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14775"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-11tt-44je-dfg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57023?format=json","vulnerability_id":"VCID-187q-sxxu-zyh5","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14836.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14836","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70504","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14836"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890763","reference_id":"1890763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:40Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14836"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-187q-sxxu-zyh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80385?format=json","vulnerability_id":"VCID-1b6h-r8cr-7be7","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2169","reference_id":"","reference_type":"","scores":[{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2169"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951756","reference_id":"1951756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951756"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:02Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2169"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1b6h-r8cr-7be7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80391?format=json","vulnerability_id":"VCID-1muw-xrgz-uub8","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2179","reference_id":"","reference_type":"","scores":[{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2179"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951761","reference_id":"1951761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951761"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2179"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1muw-xrgz-uub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57040?format=json","vulnerability_id":"VCID-1vkz-z2pq-nbat","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14861","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14861"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890773","reference_id":"1890773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:15Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14861"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vkz-z2pq-nbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57009?format=json","vulnerability_id":"VCID-1vm5-s57q-5fh7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14800","reference_id":"","reference_type":"","scores":[{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.5534","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55415","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55515","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55454","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55507","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55516","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00324","scoring_system":"epss","scoring_elements":"0.55495","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890753","reference_id":"1890753","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890753"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:14Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14800"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vm5-s57q-5fh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57010?format=json","vulnerability_id":"VCID-26c7-8j5m-pygt","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14804","reference_id":"","reference_type":"","scores":[{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.5896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59026","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59023","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.58948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59006","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14804"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890754","reference_id":"1890754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890754"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:09Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14804"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-26c7-8j5m-pygt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57140?format=json","vulnerability_id":"VCID-29k9-yssc-jbec","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2036.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2036","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2036"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922395","reference_id":"1922395","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922395"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:09Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2036"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-29k9-yssc-jbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57145?format=json","vulnerability_id":"VCID-2fyj-vfka-g3fc","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2046","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2046"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922398","reference_id":"1922398","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922398"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:55Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2046"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2fyj-vfka-g3fc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57151?format=json","vulnerability_id":"VCID-2hqz-t746-57bt","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2060.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2060","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2060"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922402","reference_id":"1922402","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922402"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:44Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2060"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hqz-t746-57bt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80143?format=json","vulnerability_id":"VCID-2sc2-r3y9-37as","summary":"mysql: Server: Federated unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2354.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2354","reference_id":"","reference_type":"","scores":[{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58105","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.5826","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58237","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58252","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58227","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58204","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58183","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00361","scoring_system":"epss","scoring_elements":"0.58238","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992298","reference_id":"1992298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992298"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2354"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sc2-r3y9-37as"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80145?format=json","vulnerability_id":"VCID-2sdk-9wte-n7ct","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2357.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2357","reference_id":"","reference_type":"","scores":[{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59643","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59776","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59796","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59806","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59789","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.5976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59762","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2357"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992300","reference_id":"1992300","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992300"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2357"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2sdk-9wte-n7ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57014?format=json","vulnerability_id":"VCID-2ytu-hw3r-ffc8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14814","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14814"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890757","reference_id":"1890757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:00Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14814"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2ytu-hw3r-ffc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57051?format=json","vulnerability_id":"VCID-2zv1-9c2g-fkdq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14893","reference_id":"","reference_type":"","scores":[{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52483","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52628","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52635","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52571","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52569","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.5262","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14893"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890783","reference_id":"1890783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890783"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14893"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2zv1-9c2g-fkdq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80146?format=json","vulnerability_id":"VCID-31vn-exfm-kuh2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2367","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992301","reference_id":"1992301","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992301"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2367"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-31vn-exfm-kuh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57147?format=json","vulnerability_id":"VCID-3k3d-296j-kycn","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2055","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2055"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922400","reference_id":"1922400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922400"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2055"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k3d-296j-kycn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57139?format=json","vulnerability_id":"VCID-3v1d-x9yt-3fbb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2032.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2032","reference_id":"","reference_type":"","scores":[{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48776","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48798","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48844","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4889","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48847","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4884","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48862","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48836","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2032"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922394","reference_id":"1922394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922394"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2032"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3v1d-x9yt-3fbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80147?format=json","vulnerability_id":"VCID-3wz3-pm9w-vkd7","summary":"mysql: Server: DML unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2370.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2370","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2370"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992302","reference_id":"1992302","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992302"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2370"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wz3-pm9w-vkd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80156?format=json","vulnerability_id":"VCID-3ye4-pp2j-nkcy","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2399.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2399","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992311","reference_id":"1992311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992311"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2399"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ye4-pp2j-nkcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80397?format=json","vulnerability_id":"VCID-4c8x-j238-bbgz","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2201","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2201"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951766","reference_id":"1951766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951766"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2201"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4c8x-j238-bbgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57146?format=json","vulnerability_id":"VCID-4fdf-ne4n-wyc2","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2048.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2048","reference_id":"","reference_type":"","scores":[{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54481","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54467","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54513","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54532","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54488","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54503","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54472","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54519","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54531","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2048"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922399","reference_id":"1922399","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922399"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:54Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2048"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4fdf-ne4n-wyc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57003?format=json","vulnerability_id":"VCID-4msq-13an-d7cb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14789","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14789"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890747","reference_id":"1890747","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890747"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14789"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4msq-13an-d7cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80415?format=json","vulnerability_id":"VCID-4qkm-twqk-nud6","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2300.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2300","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2300"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951781","reference_id":"1951781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951781"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2300"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qkm-twqk-nud6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57042?format=json","vulnerability_id":"VCID-4qvq-j6yh-ckbf","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14866.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14866","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14866"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890774","reference_id":"1890774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890774"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:13Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14866"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qvq-j6yh-ckbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57119?format=json","vulnerability_id":"VCID-4zfz-7zkz-e7hn","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2002","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3482","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34896","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34859","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34836","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34875","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34814","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3494","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922380","reference_id":"1922380","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922380"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2002"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zfz-7zkz-e7hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80387?format=json","vulnerability_id":"VCID-4zyv-b7d8-t7ec","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2171.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2171","reference_id":"","reference_type":"","scores":[{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76519","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76498","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76492","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76532","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76536","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76524","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76558","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76465","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76447","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951758","reference_id":"1951758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951758"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2171"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4zyv-b7d8-t7ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80409?format=json","vulnerability_id":"VCID-537e-defy-1qgh","summary":"mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2232.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2232","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29762","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30015","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.29829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30063","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30119","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30083","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2232"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951776","reference_id":"1951776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951776"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2232"],"risk_score":0.8,"exploitability":"0.5","weighted_severity":"1.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-537e-defy-1qgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80167?format=json","vulnerability_id":"VCID-5hjy-fmy7-cyac","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2427","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2427"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992321","reference_id":"1992321","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992321"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2427"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjy-fmy7-cyac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80162?format=json","vulnerability_id":"VCID-5msw-bc1r-23e7","summary":"mysql: Server: PS unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2422","reference_id":"","reference_type":"","scores":[{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.40956","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41256","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41153","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41253","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.4118","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41236","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41258","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41227","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00193","scoring_system":"epss","scoring_elements":"0.41213","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2422"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992317","reference_id":"1992317","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992317"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2422"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5msw-bc1r-23e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56999?format=json","vulnerability_id":"VCID-5sgr-q6mn-u7gq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14776","reference_id":"","reference_type":"","scores":[{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76541","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76678","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76555","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76594","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7664","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76628","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.7666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00968","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890743","reference_id":"1890743","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890743"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:48Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14776"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5sgr-q6mn-u7gq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57004?format=json","vulnerability_id":"VCID-5ug6-v7ru-j3bv","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14790.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14790","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74827","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14790"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890748","reference_id":"1890748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890748"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14790"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ug6-v7ru-j3bv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80140?format=json","vulnerability_id":"VCID-6674-4tmg-1qbg","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2339.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2339","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.4141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41142","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2339"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992280","reference_id":"1992280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992280"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2339"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6674-4tmg-1qbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57118?format=json","vulnerability_id":"VCID-66fe-xw3w-xbfh","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2001","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58308","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58326","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58318","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.5827","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58249","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922379","reference_id":"1922379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922379"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"}],"fixed_packages":[],"aliases":["CVE-2021-2001"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-66fe-xw3w-xbfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80412?format=json","vulnerability_id":"VCID-6dtf-9d7c-buep","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2293","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2293"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951778","reference_id":"1951778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951778"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2293"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dtf-9d7c-buep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57001?format=json","vulnerability_id":"VCID-6grs-76qf-jqhf","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14785","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890745","reference_id":"1890745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890745"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14785"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6grs-76qf-jqhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80150?format=json","vulnerability_id":"VCID-6u9x-qcnt-cqc8","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2383","reference_id":"","reference_type":"","scores":[{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54885","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54889","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54938","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54914","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5488","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.5493","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2383"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992305","reference_id":"1992305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992305"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2383"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u9x-qcnt-cqc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57011?format=json","vulnerability_id":"VCID-6w26-6psj-zubm","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14809","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14809"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890755","reference_id":"1890755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890755"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:05Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14809"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6w26-6psj-zubm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57018?format=json","vulnerability_id":"VCID-6z2t-rt9t-wydy","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14828.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14828","reference_id":"","reference_type":"","scores":[{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76219","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76365","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76279","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7632","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76325","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76353","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76254","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76234","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76266","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.7628","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76306","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00942","scoring_system":"epss","scoring_elements":"0.76284","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14828"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890760","reference_id":"1890760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T19:54:02Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14828"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6z2t-rt9t-wydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57032?format=json","vulnerability_id":"VCID-71bd-rm5x-cud8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14848","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14848"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890770","reference_id":"1890770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:27Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14848"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-71bd-rm5x-cud8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80386?format=json","vulnerability_id":"VCID-77bs-kuvf-eua3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2170.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2170","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2170"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951757","reference_id":"1951757","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951757"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:00Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2170"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-77bs-kuvf-eua3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57024?format=json","vulnerability_id":"VCID-7jj8-tenv-zub1","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14837","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14837"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890764","reference_id":"1890764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890764"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:39Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14837"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jj8-tenv-zub1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80407?format=json","vulnerability_id":"VCID-7shp-crcm-vqfe","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2226.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2226","reference_id":"","reference_type":"","scores":[{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82386","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82401","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82495","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82522","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82532","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82419","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82443","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01732","scoring_system":"epss","scoring_elements":"0.82494","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2226"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951774","reference_id":"1951774","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951774"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2226"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7shp-crcm-vqfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80158?format=json","vulnerability_id":"VCID-82ep-d3fc-dbc2","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2410","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2410"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992313","reference_id":"1992313","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992313"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2410"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-82ep-d3fc-dbc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57132?format=json","vulnerability_id":"VCID-8h4m-83xa-m7df","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2021.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2021","reference_id":"","reference_type":"","scores":[{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97882","published_at":"2026-04-01T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97915","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97902","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97903","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97911","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.9791","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51799","scoring_system":"epss","scoring_elements":"0.97909","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2021"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922388","reference_id":"1922388","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922388"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2021"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4m-83xa-m7df"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80404?format=json","vulnerability_id":"VCID-8xpx-1fpf-m3fa","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2215","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2215"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951772","reference_id":"1951772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2215"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8xpx-1fpf-m3fa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80394?format=json","vulnerability_id":"VCID-9dt5-yek1-wfg9","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2194.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2194","reference_id":"","reference_type":"","scores":[{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78612","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78739","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.7869","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78687","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78722","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.78649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0117","scoring_system":"epss","scoring_elements":"0.7863","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2194"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2194"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951764","reference_id":"1951764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951764"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2194"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dt5-yek1-wfg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57027?format=json","vulnerability_id":"VCID-9ycb-mjma-7qfv","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14839.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14839","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14839"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890766","reference_id":"1890766","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890766"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14839"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ycb-mjma-7qfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57000?format=json","vulnerability_id":"VCID-aaq9-6yhn-afbx","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14777","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14777"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890744","reference_id":"1890744","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890744"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14777"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aaq9-6yhn-afbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57020?format=json","vulnerability_id":"VCID-aczd-32sa-fffg","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14829","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890761","reference_id":"1890761","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890761"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:49Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14829"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aczd-32sa-fffg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80151?format=json","vulnerability_id":"VCID-b4wd-75p9-bqgh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2384","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2384"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992306","reference_id":"1992306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992306"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2384"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4wd-75p9-bqgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80170?format=json","vulnerability_id":"VCID-bg43-1ngx-17cb","summary":"mysql: Server: DML unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2440","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34845","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992324","reference_id":"1992324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2440"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bg43-1ngx-17cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80171?format=json","vulnerability_id":"VCID-byam-rx6m-3yab","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2441","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2441"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992325","reference_id":"1992325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2441"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byam-rx6m-3yab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80168?format=json","vulnerability_id":"VCID-c5u7-hdrq-2qcm","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2429","reference_id":"","reference_type":"","scores":[{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.9008","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.9012","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90137","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90134","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90092","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05389","scoring_system":"epss","scoring_elements":"0.90118","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2429"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992322","reference_id":"1992322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-889/","reference_id":"ZDI-21-889","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:35Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-889/"}],"fixed_packages":[],"aliases":["CVE-2021-2429"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c5u7-hdrq-2qcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57137?format=json","vulnerability_id":"VCID-c6rw-mujf-qqbj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2030.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2030","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2030"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922392","reference_id":"1922392","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922392"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2030"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c6rw-mujf-qqbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57153?format=json","vulnerability_id":"VCID-ch22-5f87-tfhw","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2061.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2061","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2061"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922403","reference_id":"1922403","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922403"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:42Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2061"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ch22-5f87-tfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80153?format=json","vulnerability_id":"VCID-ckdu-28ct-2kb7","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2387","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992308","reference_id":"1992308","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2387"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ckdu-28ct-2kb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57043?format=json","vulnerability_id":"VCID-cr9r-v269-7qan","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14867.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14867","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890775","reference_id":"1890775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890775"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:11Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14867"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cr9r-v269-7qan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56987?format=json","vulnerability_id":"VCID-d5hc-4qz5-3uag","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14672","reference_id":"","reference_type":"","scores":[{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77961","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78091","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.7799","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.77998","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78002","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78029","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78012","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78071","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01097","scoring_system":"epss","scoring_elements":"0.78078","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14672"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890737","reference_id":"1890737","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890737"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14672"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5hc-4qz5-3uag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57162?format=json","vulnerability_id":"VCID-d5js-9kvw-dyf9","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2122","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2122"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922411","reference_id":"1922411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922411"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:53:22Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2122"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5js-9kvw-dyf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57028?format=json","vulnerability_id":"VCID-da5g-ea4u-qfeh","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14844.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14844","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14844"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890767","reference_id":"1890767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890767"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:32Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14844"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-da5g-ea4u-qfeh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57005?format=json","vulnerability_id":"VCID-dcyd-xspe-q7eh","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json","reference_id":"","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14791.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14791","reference_id":"","reference_type":"","scores":[{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62177","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62095","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62132","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62152","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62141","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6212","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62164","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.6217","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62167","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62183","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14791"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890749","reference_id":"1890749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890749"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"2.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14791"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcyd-xspe-q7eh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57141?format=json","vulnerability_id":"VCID-dsp1-f2v8-z7fb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2038.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2038","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2038"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922396","reference_id":"1922396","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922396"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2038"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dsp1-f2v8-z7fb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80410?format=json","vulnerability_id":"VCID-dv9f-cgsn-skgf","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2278","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2278"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951777","reference_id":"1951777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951777"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2278"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dv9f-cgsn-skgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80169?format=json","vulnerability_id":"VCID-dwdy-u6t6-d7d3","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2437","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2437"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992323","reference_id":"1992323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2437"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dwdy-u6t6-d7d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80400?format=json","vulnerability_id":"VCID-e7y6-8acx-tuh8","summary":"mysql: Server: Partition unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2208","reference_id":"","reference_type":"","scores":[{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.8019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80197","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80327","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80277","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80303","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80309","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80263","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80242","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01375","scoring_system":"epss","scoring_elements":"0.80272","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2208"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951769","reference_id":"1951769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951769"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2208"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e7y6-8acx-tuh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80155?format=json","vulnerability_id":"VCID-e8ty-bkjz-5bh4","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2390.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2390","reference_id":"","reference_type":"","scores":[{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84294","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84385","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84386","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84388","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84414","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84423","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.8435","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84356","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84374","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02184","scoring_system":"epss","scoring_elements":"0.84367","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2390"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992310","reference_id":"1992310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992310"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-881/","reference_id":"ZDI-21-881","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:17Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-881/"}],"fixed_packages":[],"aliases":["CVE-2021-2390"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e8ty-bkjz-5bh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57156?format=json","vulnerability_id":"VCID-eh72-pgfd-x3dy","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2070","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2070"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922405","reference_id":"1922405","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922405"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:37Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2070"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eh72-pgfd-x3dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80144?format=json","vulnerability_id":"VCID-f2hn-79mj-fyer","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2356","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47564","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47584","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47608","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.4765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47596","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47585","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47588","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2356"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992299","reference_id":"1992299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992299"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2356"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f2hn-79mj-fyer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80413?format=json","vulnerability_id":"VCID-fvuq-5szu-akfn","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2298.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2298","reference_id":"","reference_type":"","scores":[{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81293","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.8142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81409","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81416","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81315","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01537","scoring_system":"epss","scoring_elements":"0.81346","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2298"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951779","reference_id":"1951779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951779"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2298"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fvuq-5szu-akfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80420?format=json","vulnerability_id":"VCID-g1py-km6y-uka8","summary":"mysql: Server: Packaging unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2307.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2307","reference_id":"","reference_type":"","scores":[{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63453","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63594","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63567","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63586","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.6354","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63504","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63556","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63574","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63576","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2307"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951785","reference_id":"1951785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951785"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2307"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1py-km6y-uka8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57160?format=json","vulnerability_id":"VCID-g58r-8vcn-bfea","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2087","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25717","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2087"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922408","reference_id":"1922408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2087"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g58r-8vcn-bfea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80382?format=json","vulnerability_id":"VCID-gb4c-ypuu-gfgq","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2164.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2164","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2164"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951754","reference_id":"1951754","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951754"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:05Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2164"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gb4c-ypuu-gfgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80166?format=json","vulnerability_id":"VCID-gm7z-m589-77gy","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2426","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2426"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992320","reference_id":"1992320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992320"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2426"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gm7z-m589-77gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57136?format=json","vulnerability_id":"VCID-gmxv-dxp3-cuhq","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2028","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922391","reference_id":"1922391","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922391"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:17Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2028"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gmxv-dxp3-cuhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57026?format=json","vulnerability_id":"VCID-h2r2-p8v7-sfc6","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14838","reference_id":"","reference_type":"","scores":[{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48171","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48208","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48285","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.4824","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48221","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48233","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48228","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48235","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0025","scoring_system":"epss","scoring_elements":"0.48254","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890765","reference_id":"1890765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890765"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:38Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14838"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2r2-p8v7-sfc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80152?format=json","vulnerability_id":"VCID-h558-qvwc-73hv","summary":"mysql: Server: Replication unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json","reference_id":"","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2385","reference_id":"","reference_type":"","scores":[{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60402","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60483","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60491","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60499","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60489","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60473","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.6043","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60397","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60446","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00396","scoring_system":"epss","scoring_elements":"0.60462","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2385"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992307","reference_id":"1992307","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992307"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2385"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h558-qvwc-73hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56997?format=json","vulnerability_id":"VCID-hrbc-2cpw-5be7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14773.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14773","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14773"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890742","reference_id":"1890742","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890742"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:52Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14773"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrbc-2cpw-5be7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79974?format=json","vulnerability_id":"VCID-hsue-93wh-mygh","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35629","reference_id":"","reference_type":"","scores":[{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48128","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48164","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48133","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48194","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48176","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48186","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.4818","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48191","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00249","scoring_system":"epss","scoring_elements":"0.48243","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35629"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016116","reference_id":"2016116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016116"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:20Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-35629"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsue-93wh-mygh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80164?format=json","vulnerability_id":"VCID-j6as-4yhs-dyhq","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2424","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2424"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992318","reference_id":"1992318","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992318"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2424"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j6as-4yhs-dyhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80148?format=json","vulnerability_id":"VCID-j734-hefa-1yaa","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2372.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2372","reference_id":"","reference_type":"","scores":[{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49828","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4985","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49893","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49892","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49882","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49883","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49928","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49929","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49901","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49895","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2372"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2372"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992303","reference_id":"1992303","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992303"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","reference_id":"2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://security.archlinux.org/AVG-2226","reference_id":"AVG-2226","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2226"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-2/","reference_id":"USN-5022-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-2/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","reference_id":"VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:37Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"}],"fixed_packages":[],"aliases":["CVE-2021-2372"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j734-hefa-1yaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57021?format=json","vulnerability_id":"VCID-jate-mc8k-13gn","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14830","reference_id":"","reference_type":"","scores":[{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70854","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890762","reference_id":"1890762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14830"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jate-mc8k-13gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80393?format=json","vulnerability_id":"VCID-jntg-92ur-nbfa","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2193.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2193","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2193"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951763","reference_id":"1951763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2193"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jntg-92ur-nbfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80423?format=json","vulnerability_id":"VCID-k3vn-aruy-nfan","summary":"mysql: InnoDB unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2174","reference_id":"","reference_type":"","scores":[{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76249","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76394","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76296","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7631","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76374","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76382","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76284","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76264","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952802","reference_id":"1952802","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1952802"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"}],"fixed_packages":[],"aliases":["CVE-2021-2174"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3vn-aruy-nfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57031?format=json","vulnerability_id":"VCID-k4fk-qkr8-1uac","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14846.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14846","reference_id":"","reference_type":"","scores":[{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70779","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70794","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70838","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.7087","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70925","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70787","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70847","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70854","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890769","reference_id":"1890769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890769"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:29Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14846"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k4fk-qkr8-1uac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80389?format=json","vulnerability_id":"VCID-kff6-5fr1-1khv","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2172.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2172","reference_id":"","reference_type":"","scores":[{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.79972","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.79979","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80101","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.79991","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80028","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80048","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80024","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80052","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80053","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80086","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01342","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951759","reference_id":"1951759","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951759"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2172"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kff6-5fr1-1khv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57138?format=json","vulnerability_id":"VCID-kwfb-kbpq-pkck","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2031.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2031","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2031"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922393","reference_id":"1922393","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922393"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:14Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2031"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwfb-kbpq-pkck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57158?format=json","vulnerability_id":"VCID-m2ey-feyg-ufb7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2076","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2076"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922407","reference_id":"1922407","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922407"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:33Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2076"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2ey-feyg-ufb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57165?format=json","vulnerability_id":"VCID-muzn-dqpe-q7cr","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2180","reference_id":"","reference_type":"","scores":[{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89099","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.8918","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.8915","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89146","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89144","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89171","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04512","scoring_system":"epss","scoring_elements":"0.89176","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951762","reference_id":"1951762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.gentoo.org/glsa/202105-28","reference_id":"GLSA-202105-28","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://security.gentoo.org/glsa/202105-28"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:50Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2180"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-muzn-dqpe-q7cr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57125?format=json","vulnerability_id":"VCID-my1q-4m9d-9fgj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2011","reference_id":"","reference_type":"","scores":[{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84167","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84245","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.8425","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84274","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84284","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84185","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02144","scoring_system":"epss","scoring_elements":"0.84186","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2011"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922384","reference_id":"1922384","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922384"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210622-0001/","reference_id":"ntap-20210622-0001","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2327","reference_id":"RHSA-2019:2327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2011"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-my1q-4m9d-9fgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80149?format=json","vulnerability_id":"VCID-n7tf-y62f-wyfe","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json","reference_id":"","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2374.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2374","reference_id":"","reference_type":"","scores":[{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37312","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37474","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.36973","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37367","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3734","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37091","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37061","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37499","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37378","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.3739","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2374"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992304","reference_id":"1992304","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992304"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2374"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7tf-y62f-wyfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57161?format=json","vulnerability_id":"VCID-n9r2-crxf-jfh7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2088.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2088","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25744","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25815","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25508","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25661","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25644","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25615","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25558","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25858","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.257","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25757","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25717","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2088"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922410","reference_id":"1922410","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922410"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2088"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n9r2-crxf-jfh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57015?format=json","vulnerability_id":"VCID-ndhs-j4q8-zkf8","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14821.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14821","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14821"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890758","reference_id":"1890758","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890758"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:53Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14821"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndhs-j4q8-zkf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80379?format=json","vulnerability_id":"VCID-njb2-z4kz-zybs","summary":"mysql: Server: Options unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2146","reference_id":"","reference_type":"","scores":[{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82369","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82447","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.824","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01728","scoring_system":"epss","scoring_elements":"0.82397","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951751","reference_id":"1951751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951751"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:52:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2146"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njb2-z4kz-zybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57030?format=json","vulnerability_id":"VCID-njkb-a6xx-wke9","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14845.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14845","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14845"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890768","reference_id":"1890768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:31Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14845"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njkb-a6xx-wke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57148?format=json","vulnerability_id":"VCID-p15d-cz1g-hucw","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2056","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922419","reference_id":"1922419","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922419"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:48Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2056"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p15d-cz1g-hucw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80395?format=json","vulnerability_id":"VCID-p559-ueva-ffgv","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2196","reference_id":"","reference_type":"","scores":[{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.7914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79194","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79185","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79211","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01233","scoring_system":"epss","scoring_elements":"0.79165","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2196"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951765","reference_id":"1951765","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951765"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2196"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p559-ueva-ffgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80414?format=json","vulnerability_id":"VCID-p6g6-hqgv-vuce","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2299","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2299"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951780","reference_id":"1951780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951780"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2299"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p6g6-hqgv-vuce"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57044?format=json","vulnerability_id":"VCID-pawh-67dd-xbay","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14868","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14868"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890776","reference_id":"1890776","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890776"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:10Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14868"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pawh-67dd-xbay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56995?format=json","vulnerability_id":"VCID-pfkc-qtn3-skgp","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14769.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14769","reference_id":"","reference_type":"","scores":[{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80781","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80674","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.8067","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80724","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80711","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80737","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80741","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01438","scoring_system":"epss","scoring_elements":"0.80768","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14769"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890739","reference_id":"1890739","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890739"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:57Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14769"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pfkc-qtn3-skgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56994?format=json","vulnerability_id":"VCID-pmhc-1rhq-gfeb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14765.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14765","reference_id":"","reference_type":"","scores":[{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82539","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82667","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.8255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82576","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82602","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82629","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.8265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01757","scoring_system":"epss","scoring_elements":"0.82661","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14765"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14765"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890738","reference_id":"1890738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890738"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:45:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14765"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pmhc-1rhq-gfeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57037?format=json","vulnerability_id":"VCID-ptkb-y547-skg4","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14860.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14860","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40685","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40745","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40789","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40681","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40796","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40772","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40763","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14860"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890772","reference_id":"1890772","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:17Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14860"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ptkb-y547-skg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57012?format=json","vulnerability_id":"VCID-qe1p-f4h5-uyga","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14812","reference_id":"","reference_type":"","scores":[{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80405","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.8039","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80412","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80442","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01394","scoring_system":"epss","scoring_elements":"0.80449","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14812"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890756","reference_id":"1890756","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890756"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/","reference_id":"JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JBZZ3XIRPFPAWBZLYBN777ANXSFXAPPB/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html","reference_id":"msg00027.html","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/01/msg00027.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/","reference_id":"OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPW5YMZR5C7D7NBZQSTDOB3XAI5QP32Y/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14812"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qe1p-f4h5-uyga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80418?format=json","vulnerability_id":"VCID-qqae-rsw8-x7gp","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2304","reference_id":"","reference_type":"","scores":[{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52023","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52071","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52074","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52104","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52111","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52097","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52062","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52112","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00287","scoring_system":"epss","scoring_elements":"0.52172","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2304"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951783","reference_id":"1951783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951783"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2304"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qqae-rsw8-x7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57007?format=json","vulnerability_id":"VCID-qrcr-rtqs-f3g7","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14794.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14794","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14794"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890751","reference_id":"1890751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890751"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14794"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qrcr-rtqs-f3g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80154?format=json","vulnerability_id":"VCID-qv7j-a4nn-97f7","summary":"mysql: InnoDB unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2389.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2389","reference_id":"","reference_type":"","scores":[{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68107","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68042","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68066","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68052","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68054","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68067","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.6805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.68101","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00552","scoring_system":"epss","scoring_elements":"0.67979","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2389"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2389"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992309","reference_id":"1992309","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992309"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","reference_id":"2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"reference_url":"https://security.archlinux.org/AVG-2226","reference_id":"AVG-2226","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2226"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-2/","reference_id":"USN-5022-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-2/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","reference_id":"VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"},{"reference_url":"https://www.zerodayinitiative.com/advisories/ZDI-21-880/","reference_id":"ZDI-21-880","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:18Z/"}],"url":"https://www.zerodayinitiative.com/advisories/ZDI-21-880/"}],"fixed_packages":[],"aliases":["CVE-2021-2389"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qv7j-a4nn-97f7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79953?format=json","vulnerability_id":"VCID-qzc8-kgrw-7yg2","summary":"mysql: Server: DML unspecified vulnerability (CPU Oct 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35537.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35537","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35145","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35346","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35241","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35007","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34987","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35373","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35255","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35327","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35267","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35305","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35537"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016092","reference_id":"2016092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2016092"},{"reference_url":"https://security.netapp.com/advisory/ntap-20211022-0003/","reference_id":"ntap-20211022-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:15:08Z/"}],"url":"https://security.netapp.com/advisory/ntap-20211022-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-35537"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qzc8-kgrw-7yg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80403?format=json","vulnerability_id":"VCID-r4wz-4cet-p3ch","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2213","reference_id":"","reference_type":"","scores":[{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70736","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70751","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70887","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70879","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70889","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70828","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70797","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00649","scoring_system":"epss","scoring_elements":"0.70842","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2213"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951771","reference_id":"1951771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2213"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4wz-4cet-p3ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57033?format=json","vulnerability_id":"VCID-r6xq-en8s-u3db","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14852","reference_id":"","reference_type":"","scores":[{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42642","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42543","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42714","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42625","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4268","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42745","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14852"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890771","reference_id":"1890771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890771"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:22Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14852"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r6xq-en8s-u3db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57133?format=json","vulnerability_id":"VCID-rf1r-a5xx-akb3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2022","reference_id":"","reference_type":"","scores":[{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.64986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65128","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65096","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65068","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65114","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65098","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65116","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65064","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0048","scoring_system":"epss","scoring_elements":"0.65025","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2022"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922389","reference_id":"1922389","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922389"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5246","reference_id":"RHSA-2020:5246","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5500","reference_id":"RHSA-2020:5500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5654","reference_id":"RHSA-2020:5654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5654"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5663","reference_id":"RHSA-2020:5663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:5665","reference_id":"RHSA-2020:5665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:5665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2022"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rf1r-a5xx-akb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80399?format=json","vulnerability_id":"VCID-rr3t-1zsh-b7hm","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2203.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2203","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2203"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951768","reference_id":"1951768","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951768"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2203"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rr3t-1zsh-b7hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80157?format=json","vulnerability_id":"VCID-sguy-dt9t-ybgk","summary":"mysql: Server: Locking unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2402.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2402","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2402"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992312","reference_id":"1992312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2402"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sguy-dt9t-ybgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57143?format=json","vulnerability_id":"VCID-sq21-9e5z-muhb","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json","reference_id":"","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2042.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2042","reference_id":"","reference_type":"","scores":[{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28039","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.2756","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27885","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27894","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27875","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27637","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.28081","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00101","scoring_system":"epss","scoring_elements":"0.27944","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2042"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922397","reference_id":"1922397","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922397"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"2.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2042"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sq21-9e5z-muhb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80417?format=json","vulnerability_id":"VCID-suhd-prx3-k7fy","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2301.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2301","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54796","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5492","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54875","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54895","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5486","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.5491","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54903","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54917","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2301"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951782","reference_id":"1951782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951782"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2301"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-suhd-prx3-k7fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57046?format=json","vulnerability_id":"VCID-swdu-cgp2-77e4","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14870.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14870","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14870"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890778","reference_id":"1890778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890778"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:07Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14870"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-swdu-cgp2-77e4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57002?format=json","vulnerability_id":"VCID-t31g-7742-fqhk","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14786","reference_id":"","reference_type":"","scores":[{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74442","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74417","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74488","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74498","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00825","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14786"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890746","reference_id":"1890746","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890746"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14786"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t31g-7742-fqhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80142?format=json","vulnerability_id":"VCID-tb6v-1rdb-m3hv","summary":"mysql: Server: DDL unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2352.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2352","reference_id":"","reference_type":"","scores":[{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41408","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41142","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41422","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41442","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.4141","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41439","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41228","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41222","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41363","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00195","scoring_system":"epss","scoring_elements":"0.41413","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2352"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992297","reference_id":"1992297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992297"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:51:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2352"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tb6v-1rdb-m3hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80165?format=json","vulnerability_id":"VCID-tbfj-dfqj-6ff1","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2425","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2425"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992319","reference_id":"1992319","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2425"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tbfj-dfqj-6ff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57157?format=json","vulnerability_id":"VCID-td7w-db1k-t3g3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2072","reference_id":"","reference_type":"","scores":[{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56683","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56738","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56822","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56798","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.5683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0034","scoring_system":"epss","scoring_elements":"0.56816","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2072"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922406","reference_id":"1922406","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922406"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2072"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-td7w-db1k-t3g3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80398?format=json","vulnerability_id":"VCID-tdsp-tezp-2qhy","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2202.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2202","reference_id":"","reference_type":"","scores":[{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81235","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81237","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81265","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81205","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01511","scoring_system":"epss","scoring_elements":"0.81198","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2202"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951767","reference_id":"1951767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951767"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2202"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdsp-tezp-2qhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57154?format=json","vulnerability_id":"VCID-teu1-w449-fkcx","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2065.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2065","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2065"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922404","reference_id":"1922404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922404"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2065"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teu1-w449-fkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57134?format=json","vulnerability_id":"VCID-tudj-guxj-53ea","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2024.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2024","reference_id":"","reference_type":"","scores":[{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7041","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70564","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70505","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70441","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70419","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.7048","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00637","scoring_system":"epss","scoring_elements":"0.70504","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2024"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922390","reference_id":"1922390","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922390"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2024"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tudj-guxj-53ea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57050?format=json","vulnerability_id":"VCID-tv36-3tsk-uket","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14891","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14891"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890782","reference_id":"1890782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890782"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:53Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14891"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tv36-3tsk-uket"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80390?format=json","vulnerability_id":"VCID-unnc-t1ky-c3fx","summary":"mysql: Server: Replication unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2178","reference_id":"","reference_type":"","scores":[{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.8018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80191","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80212","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80213","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80215","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80242","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80251","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01365","scoring_system":"epss","scoring_elements":"0.80152","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2178"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951760","reference_id":"1951760","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951760"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:43:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"}],"fixed_packages":[],"aliases":["CVE-2021-2178"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unnc-t1ky-c3fx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80405?format=json","vulnerability_id":"VCID-usjz-e1at-vubb","summary":"mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2217.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2217","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951773","reference_id":"1951773","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951773"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2217"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-usjz-e1at-vubb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57159?format=json","vulnerability_id":"VCID-uzvh-tvvx-vyer","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2081.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2081","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2081"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922416","reference_id":"1922416","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922416"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2081"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uzvh-tvvx-vyer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57006?format=json","vulnerability_id":"VCID-vap7-ycjn-73d1","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14793.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14793","reference_id":"","reference_type":"","scores":[{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.7483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74756","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74749","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74785","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74793","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74819","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00843","scoring_system":"epss","scoring_elements":"0.74827","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14793"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890750","reference_id":"1890750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890750"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/","reference_id":"GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GZU3PA5XJXNQ4C4F6435ARM6WKM3OZYR/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/","reference_id":"O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O7RVY2Z7HYQHFJXBGARXUAGKUDAWYPP4/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/","reference_id":"ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:44:25Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZVS6KNVBZCLZBKNJ5JA2PGAG3NTOJVH6/"}],"fixed_packages":[],"aliases":["CVE-2020-14793"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vap7-ycjn-73d1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80419?format=json","vulnerability_id":"VCID-vfxa-abgu-9ydp","summary":"mysql: Server: DML unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2305.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2305","reference_id":"","reference_type":"","scores":[{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54194","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54255","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54322","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54302","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54245","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54299","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54278","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2305"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951784","reference_id":"1951784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951784"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2305"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vfxa-abgu-9ydp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80139?format=json","vulnerability_id":"VCID-vsrs-874z-7qh7","summary":"mysql: Server: Memcached unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2340.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2340","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35491","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35881","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35858","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35837","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35577","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36013","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35917","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2340"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992279","reference_id":"1992279","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992279"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2340"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vsrs-874z-7qh7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80161?format=json","vulnerability_id":"VCID-vucs-k62a-xke9","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2418","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992316","reference_id":"1992316","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992316"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2418"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vucs-k62a-xke9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80141?format=json","vulnerability_id":"VCID-w8gu-h6z8-wkcx","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2342","reference_id":"","reference_type":"","scores":[{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6315","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63179","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63215","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63203","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.6318","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0044","scoring_system":"epss","scoring_elements":"0.63197","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2342"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992294","reference_id":"1992294","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992294"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","reference_id":"6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","reference_id":"OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:52:08Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2342"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w8gu-h6z8-wkcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57124?format=json","vulnerability_id":"VCID-w93s-7t77-x3fg","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2010","reference_id":"","reference_type":"","scores":[{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58439","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58449","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58488","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58501","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58505","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.5845","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58463","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00364","scoring_system":"epss","scoring_elements":"0.58432","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2010"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922383","reference_id":"1922383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922383"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/","reference_id":"CS5THZSGI7O2CZO44NWYE57AG2T7NK3K","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210622-0001/","reference_id":"ntap-20210622-0001","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210622-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/","reference_id":"T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:55:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2010"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w93s-7t77-x3fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57164?format=json","vulnerability_id":"VCID-wvxn-ugew-u7bj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2166.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2166","reference_id":"","reference_type":"","scores":[{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78602","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78506","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78489","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78516","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78549","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78548","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78545","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78578","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01154","scoring_system":"epss","scoring_elements":"0.78585","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2166"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951755","reference_id":"1951755","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951755"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428","reference_id":"988428","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988428"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/","reference_id":"AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AKV7TRUEQW6EV45RSZVVFLVQMNHVHBCJ/"},{"reference_url":"https://security.archlinux.org/ASA-202105-14","reference_id":"ASA-202105-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-14"},{"reference_url":"https://security.archlinux.org/AVG-1882","reference_id":"AVG-1882","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1882"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/","reference_id":"DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPA3CTGXPVWKHMCQDVURK4ETH7GE34KK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/","reference_id":"GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GAU7KW36A6TQGKG3RUITYSVUFIHBY3OT/"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.gentoo.org/glsa/202105-28","reference_id":"GLSA-202105-28","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://security.gentoo.org/glsa/202105-28"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/","reference_id":"JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJQRPXNDH6YHQLUSCS5VA7DAW32PN7N7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/","reference_id":"PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PEF5CRATUGQZUSQU63MHQIDZPOLHW2VE/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1007","reference_id":"RHSA-2022:1007","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1007"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1010","reference_id":"RHSA-2022:1010","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1010"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1556","reference_id":"RHSA-2022:1556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1557","reference_id":"RHSA-2022:1557","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1557"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4818","reference_id":"RHSA-2022:4818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6821","reference_id":"RHSA-2023:6821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6821"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/","reference_id":"UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:44:03Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UJVUTKKFQAWR7NURCQHQQ5JHTVYGEOYQ/"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"},{"reference_url":"https://usn.ubuntu.com/5022-3/","reference_id":"USN-5022-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-3/"}],"fixed_packages":[],"aliases":["CVE-2021-2166"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wvxn-ugew-u7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80422?format=json","vulnerability_id":"VCID-xjhs-6sgc-nfhu","summary":"mysql: Server: Information Schema unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json","reference_id":"","reference_type":"","scores":[{"value":"2.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2308.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2308","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35439","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35638","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35198","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35586","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35537","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35277","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35663","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35544","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35579","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35596","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2308"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951786","reference_id":"1951786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951786"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2308"],"risk_score":1.2,"exploitability":"0.5","weighted_severity":"2.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xjhs-6sgc-nfhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80402?format=json","vulnerability_id":"VCID-y3a3-tp5x-nqch","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2212","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951770","reference_id":"1951770","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951770"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2212"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3a3-tp5x-nqch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80172?format=json","vulnerability_id":"VCID-y5nf-6qad-13er","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2444.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2444","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34671","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3444","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34784","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34547","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34527","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34914","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34835","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34807","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34845","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2444"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992326","reference_id":"1992326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2444"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5nf-6qad-13er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57049?format=json","vulnerability_id":"VCID-yf77-atgx-dyh3","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14888.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14888","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890781","reference_id":"1890781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890781"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:42:56Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14888"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yf77-atgx-dyh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80160?format=json","vulnerability_id":"VCID-yr11-2geq-k7aa","summary":"mysql: Server: GIS unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json","reference_id":"","reference_type":"","scores":[{"value":"6.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2417","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25718","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2579","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2562","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25592","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25543","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25535","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25832","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25602","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25675","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25721","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25635","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25636","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992315","reference_id":"1992315","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992315"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/5022-1/","reference_id":"USN-5022-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5022-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2417"],"risk_score":2.7,"exploitability":"0.5","weighted_severity":"5.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yr11-2geq-k7aa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80159?format=json","vulnerability_id":"VCID-yvkw-q3bp-73d6","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2412","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50063","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50098","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50073","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50111","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50155","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5012","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50129","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5014","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50114","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2412"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992314","reference_id":"1992314","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1992314"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"}],"fixed_packages":[],"aliases":["CVE-2021-2412"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yvkw-q3bp-73d6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57150?format=json","vulnerability_id":"VCID-z7zv-zgw7-n3fj","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2058","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922401","reference_id":"1922401","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1922401"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795","reference_id":"980795","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=980795"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210219-0003/","reference_id":"ntap-20210219-0003","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T17:54:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210219-0003/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4716-1/","reference_id":"USN-4716-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4716-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2058"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7zv-zgw7-n3fj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/80408?format=json","vulnerability_id":"VCID-zkmv-3qu7-4kee","summary":"mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2021)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json","reference_id":"","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-2230.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2230","reference_id":"","reference_type":"","scores":[{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76812","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7691","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76942","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76848","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.7687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76899","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00989","scoring_system":"epss","scoring_elements":"0.76914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-2230"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951775","reference_id":"1951775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1951775"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325","reference_id":"987325","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4952-1/","reference_id":"USN-4952-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4952-1/"}],"fixed_packages":[],"aliases":["CVE-2021-2230"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zkmv-3qu7-4kee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57047?format=json","vulnerability_id":"VCID-zn55-b12v-5fax","summary":"Multiple vulnerabilities have been found in MySQL, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14873","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42247","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42234","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42192","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42299","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42262","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-14873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890779","reference_id":"1890779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1890779"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623","reference_id":"972623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972623"},{"reference_url":"https://security.gentoo.org/glsa/202105-27","reference_id":"GLSA-202105-27","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T19:43:06Z/"}],"url":"https://security.gentoo.org/glsa/202105-27"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3590","reference_id":"RHSA-2021:3590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3811","reference_id":"RHSA-2021:3811","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3811"},{"reference_url":"https://usn.ubuntu.com/4604-1/","reference_id":"USN-4604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4604-1/"}],"fixed_packages":[],"aliases":["CVE-2020-14873"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn55-b12v-5fax"}],"fixing_vulnerabilities":[],"risk_score":"3.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-mysql80-mysql@8.0.26-1%3Farch=el7"}