{"api_version":"1","generated_at":"2026-04-23T00:40:11+00:00","cve":"CVE-2021-2372","urls":{"html":"https://cve.report/CVE-2021-2372","api":"https://cve.report/api/cve/CVE-2021-2372.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-2372","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-2372"},"summary":{"title":"CVE-2021-2372","description":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","state":"PUBLIC","assigner":"secalert_us@oracle.com","published_at":"2021-07-21 15:15:00","updated_at":"2023-11-07 03:32:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://security.netapp.com/advisory/ntap-20210723-0001/","name":"https://security.netapp.com/advisory/ntap-20210723-0001/","refsource":"CONFIRM","tags":[],"title":"July 2021 MySQL Vulnerabilities in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.oracle.com/security-alerts/cpujul2021.html","name":"https://www.oracle.com/security-alerts/cpujul2021.html","refsource":"MISC","tags":[],"title":"Oracle Critical Patch Update Advisory - July 2021","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","name":"FEDORA-2021-72d5918529","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: mariadb-10.5.13-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/","name":"FEDORA-2021-72d5918529","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: mariadb-10.5.13-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","name":"FEDORA-2021-dc4299a8d0","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 33 Update: community-mysql-8.0.26-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","name":"FEDORA-2021-acef1dc8cf","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: mariadb-10.5.13-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/","name":"FEDORA-2021-acef1dc8cf","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: mariadb-10.5.13-1.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","name":"FEDORA-2021-df40c41094","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: community-mysql-8.0.26-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/","name":"FEDORA-2021-df40c41094","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: community-mysql-8.0.26-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/","name":"FEDORA-2021-dc4299a8d0","refsource":"","tags":[],"title":"[SECURITY] Fedora 33 Update: community-mysql-8.0.26-1.fc33 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-2372","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-2372","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"33","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mariadb","cpe5":"mariadb","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"active_iq_unified_manager","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"vmware_vsphere","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"active_iq_unified_manager","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"oncommand_insight","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"oncommand_workflow_automation","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"netapp","cpe5":"snapcenter","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"5.7.34","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"mysql_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"2372","vulnerable":"1","versionEndIncluding":"8.0.25","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"oracle","cpe5":"mysql_server","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-2372","qid":"159407","title":"Oracle Enterprise Linux Security Update for mysql:8.0 (ELSA-2021-3590)"},{"cve":"CVE-2021-2372","qid":"159765","title":"Oracle Enterprise Linux Security Update for mariadb:10.3 (ELSA-2022-1556)"},{"cve":"CVE-2021-2372","qid":"159775","title":"Oracle Enterprise Linux Security Update for mariadb:10.5 (ELSA-2022-1557)"},{"cve":"CVE-2021-2372","qid":"180574","title":"Debian Security Update for mariadb-10.3mariadb-10.5 (CVE-2021-2372)"},{"cve":"CVE-2021-2372","qid":"198442","title":"Ubuntu Security Notification for MySQL vulnerabilities (USN-5022-1)"},{"cve":"CVE-2021-2372","qid":"198460","title":"Ubuntu Security Notification for MariaDB Vulnerabilities (USN-5022-2)"},{"cve":"CVE-2021-2372","qid":"20225","title":"Oracle MySQL July 2021 Critical Patch Update (CPU July 2021)"},{"cve":"CVE-2021-2372","qid":"239646","title":"Red Hat Update for mysql:8.0 (RHSA-2021:3590)"},{"cve":"CVE-2021-2372","qid":"239672","title":"Red Hat Update for rh-mysql80-mysql (RHSA-2021:3811)"},{"cve":"CVE-2021-2372","qid":"240162","title":"Red Hat Update for rh-mariadb103-mariadb (RHSA-2022:1010)"},{"cve":"CVE-2021-2372","qid":"240163","title":"Red Hat Update for rh-mariadb105-mariadb (RHSA-2022:1007)"},{"cve":"CVE-2021-2372","qid":"240239","title":"Red Hat Update for mariadb:10.5 security (RHSA-2022:1557)"},{"cve":"CVE-2021-2372","qid":"240255","title":"Red Hat Update for mariadb:10.3 (RHSA-2022:1556)"},{"cve":"CVE-2021-2372","qid":"240384","title":"Red Hat Update for mariadb:10.3 (RHSA-2022:4818)"},{"cve":"CVE-2021-2372","qid":"281845","title":"Fedora Security Update for community (FEDORA-2021-df40c41094)"},{"cve":"CVE-2021-2372","qid":"281846","title":"Fedora Security Update for community (FEDORA-2021-dc4299a8d0)"},{"cve":"CVE-2021-2372","qid":"282103","title":"Fedora Security Update for mariadb (FEDORA-2021-72d5918529)"},{"cve":"CVE-2021-2372","qid":"282126","title":"Fedora Security Update for mariadb (FEDORA-2021-acef1dc8cf)"},{"cve":"CVE-2021-2372","qid":"352862","title":"Amazon Linux Security Advisory for mysql57: ALAS-2021-1544"},{"cve":"CVE-2021-2372","qid":"354476","title":"Amazon Linux Security Advisory for mariadb105 : ALAS2022-2022-182"},{"cve":"CVE-2021-2372","qid":"355152","title":"Amazon Linux Security Advisory for mariadb105 : ALAS2023-2023-037"},{"cve":"CVE-2021-2372","qid":"356265","title":"Amazon Linux Security Advisory for mariadb : ALASMARIADB10.5-2023-003"},{"cve":"CVE-2021-2372","qid":"375771","title":"MariaDB Denial of Service Vulnerabilities"},{"cve":"CVE-2021-2372","qid":"377393","title":"Alibaba Cloud Linux Security Update for mariadb:10.5 (ALINUX3-SA-2022:0034)"},{"cve":"CVE-2021-2372","qid":"500387","title":"Alpine Linux Security Update for mariadb"},{"cve":"CVE-2021-2372","qid":"501431","title":"Alpine Linux Security Update for mariadb"},{"cve":"CVE-2021-2372","qid":"501970","title":"Alpine Linux Security Update for mariadb"},{"cve":"CVE-2021-2372","qid":"504146","title":"Alpine Linux Security Update for mariadb"},{"cve":"CVE-2021-2372","qid":"690068","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for mysql (38a4a043-e937-11eb-9b84-d4c9ef517024)"},{"cve":"CVE-2021-2372","qid":"751040","title":"SUSE Enterprise Linux Security Update for mariadb (SUSE-SU-2021:2835-1)"},{"cve":"CVE-2021-2372","qid":"751046","title":"OpenSUSE Security Update for mariadb (openSUSE-SU-2021:2835-1)"},{"cve":"CVE-2021-2372","qid":"751048","title":"OpenSUSE Security Update for mariadb (openSUSE-SU-2021:2837-1)"},{"cve":"CVE-2021-2372","qid":"751098","title":"OpenSUSE Security Update for mariadb (openSUSE-SU-2021:2939-1)"},{"cve":"CVE-2021-2372","qid":"751120","title":"SUSE Enterprise Linux Security Update for mariadb (SUSE-SU-2021:3008-1)"},{"cve":"CVE-2021-2372","qid":"940376","title":"AlmaLinux Security Update for mysql:8.0 (ALSA-2021:3590)"},{"cve":"CVE-2021-2372","qid":"940485","title":"AlmaLinux Security Update for mariadb:10.3 (ALSA-2022:1556)"},{"cve":"CVE-2021-2372","qid":"940488","title":"AlmaLinux Security Update for mariadb:10.5 (ALSA-2022:1557)"},{"cve":"CVE-2021-2372","qid":"960353","title":"Rocky Linux Security Update for mariadb:10.5 (RLSA-2022:1557)"},{"cve":"CVE-2021-2372","qid":"960427","title":"Rocky Linux Security Update for mariadb:10.3 (RLSA-2022:1556)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ASSIGNER":"secalert_us@oracle.com","ID":"CVE-2021-2372","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MySQL Server","version":{"version_data":[{"version_value":"5.7.34 and prior","version_affected":"="},{"version_value":"8.0.25 and prior","version_affected":"="}]}}]},"vendor_name":"Oracle Corporation"}]}},"description":{"description_data":[{"lang":"eng","value":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)."}]},"impact":{"cvss":{"baseScore":"4.4","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server.  Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server."}]}]},"references":{"reference_data":[{"url":"https://www.oracle.com/security-alerts/cpujul2021.html","refsource":"MISC","name":"https://www.oracle.com/security-alerts/cpujul2021.html"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20210723-0001/","url":"https://security.netapp.com/advisory/ntap-20210723-0001/"},{"refsource":"FEDORA","name":"FEDORA-2021-dc4299a8d0","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6OO2Q5PIFURXLLKCIJE6XF6VL4LLMNO5/"},{"refsource":"FEDORA","name":"FEDORA-2021-df40c41094","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OPJAGVMRKODR4QIXQSVEM4BLRZUM7P3R/"},{"refsource":"FEDORA","name":"FEDORA-2021-acef1dc8cf","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/"},{"refsource":"FEDORA","name":"FEDORA-2021-72d5918529","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/"}]}},"nvd":{"publishedDate":"2021-07-21 15:15:00","lastModifiedDate":"2023-11-07 03:32:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":4.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.7,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:N/I:N/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL","baseScore":3.5},"severity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","versionStartIncluding":"5.7.0","versionEndIncluding":"5.7.34","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndIncluding":"8.0.25","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartExcluding":"10.6.0","versionEndExcluding":"10.6.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartExcluding":"10.5.0","versionEndExcluding":"10.5.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartExcluding":"10.4.0","versionEndExcluding":"10.4.21","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartExcluding":"10.3.0","versionEndExcluding":"10.3.31","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","versionStartExcluding":"10.2.0","versionEndExcluding":"10.2.40","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"2372","Ordinal":"193481","Title":"CVE-2021-2372","CVE":"CVE-2021-2372","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"2372","Ordinal":"1","NoteData":"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).","Type":"Description","Title":null},{"CveYear":"2021","CveId":"2372","Ordinal":"2","NoteData":"2021-07-20","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"2372","Ordinal":"3","NoteData":"2021-12-10","Type":"Other","Title":"Modified"}]}}}