Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/mysql@5.1.66-1?arch=el6_3
Typerpm
Namespaceredhat
Namemysql
Version5.1.66-1
Qualifiers
arch el6_3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2pdc-j83s-h7hh
vulnerability_id VCID-2pdc-j83s-h7hh
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3150.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3150.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3150
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69912
published_at 2026-04-24T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69767
published_at 2026-04-01T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69779
published_at 2026-04-02T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-04T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69771
published_at 2026-04-07T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69819
published_at 2026-04-08T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69834
published_at 2026-04-09T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69857
published_at 2026-04-11T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69842
published_at 2026-04-12T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-13T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69869
published_at 2026-04-16T12:55:00Z
11
value 0.00613
scoring_system epss
scoring_elements 0.69879
published_at 2026-04-18T12:55:00Z
12
value 0.00613
scoring_system epss
scoring_elements 0.69861
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3150
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79388
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79388
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867220
reference_id 867220
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867220
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3150
reference_id CVE-2012-3150
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3150
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3150
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pdc-j83s-h7hh
1
url VCID-2vb6-exwh-sybh
vulnerability_id VCID-2vb6-exwh-sybh
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3197.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3197.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3197
reference_id
reference_type
scores
0
value 0.0043
scoring_system epss
scoring_elements 0.62571
published_at 2026-04-24T12:55:00Z
1
value 0.0043
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-01T12:55:00Z
2
value 0.0043
scoring_system epss
scoring_elements 0.62479
published_at 2026-04-02T12:55:00Z
3
value 0.0043
scoring_system epss
scoring_elements 0.62511
published_at 2026-04-04T12:55:00Z
4
value 0.0043
scoring_system epss
scoring_elements 0.62478
published_at 2026-04-07T12:55:00Z
5
value 0.0043
scoring_system epss
scoring_elements 0.6253
published_at 2026-04-08T12:55:00Z
6
value 0.0043
scoring_system epss
scoring_elements 0.62546
published_at 2026-04-09T12:55:00Z
7
value 0.0043
scoring_system epss
scoring_elements 0.62565
published_at 2026-04-11T12:55:00Z
8
value 0.0043
scoring_system epss
scoring_elements 0.62553
published_at 2026-04-12T12:55:00Z
9
value 0.0043
scoring_system epss
scoring_elements 0.62531
published_at 2026-04-13T12:55:00Z
10
value 0.0043
scoring_system epss
scoring_elements 0.62572
published_at 2026-04-16T12:55:00Z
11
value 0.0043
scoring_system epss
scoring_elements 0.62578
published_at 2026-04-18T12:55:00Z
12
value 0.0043
scoring_system epss
scoring_elements 0.6256
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3197
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79393
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79393
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867233
reference_id 867233
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867233
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3197
reference_id CVE-2012-3197
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3197
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3197
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vb6-exwh-sybh
2
url VCID-6fhd-9qpt-tfae
vulnerability_id VCID-6fhd-9qpt-tfae
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1688.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1688.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1688
reference_id
reference_type
scores
0
value 0.00719
scoring_system epss
scoring_elements 0.72413
published_at 2026-04-07T12:55:00Z
1
value 0.00719
scoring_system epss
scoring_elements 0.72418
published_at 2026-04-02T12:55:00Z
2
value 0.00719
scoring_system epss
scoring_elements 0.72436
published_at 2026-04-04T12:55:00Z
3
value 0.00719
scoring_system epss
scoring_elements 0.72451
published_at 2026-04-08T12:55:00Z
4
value 0.00719
scoring_system epss
scoring_elements 0.72464
published_at 2026-04-09T12:55:00Z
5
value 0.00719
scoring_system epss
scoring_elements 0.72487
published_at 2026-04-11T12:55:00Z
6
value 0.00719
scoring_system epss
scoring_elements 0.72469
published_at 2026-04-12T12:55:00Z
7
value 0.00719
scoring_system epss
scoring_elements 0.72459
published_at 2026-04-13T12:55:00Z
8
value 0.00719
scoring_system epss
scoring_elements 0.72501
published_at 2026-04-16T12:55:00Z
9
value 0.00719
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-18T12:55:00Z
10
value 0.00719
scoring_system epss
scoring_elements 0.725
published_at 2026-04-21T12:55:00Z
11
value 0.00719
scoring_system epss
scoring_elements 0.72542
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1688
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814285
reference_id 814285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814285
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
fixed_packages
aliases CVE-2012-1688
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fhd-9qpt-tfae
3
url VCID-6wgd-zetu-myef
vulnerability_id VCID-6wgd-zetu-myef
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1689
reference_id
reference_type
scores
0
value 0.00864
scoring_system epss
scoring_elements 0.75047
published_at 2026-04-01T12:55:00Z
1
value 0.00864
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-02T12:55:00Z
2
value 0.00864
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-04T12:55:00Z
3
value 0.00864
scoring_system epss
scoring_elements 0.75055
published_at 2026-04-07T12:55:00Z
4
value 0.00864
scoring_system epss
scoring_elements 0.75089
published_at 2026-04-08T12:55:00Z
5
value 0.00864
scoring_system epss
scoring_elements 0.751
published_at 2026-04-09T12:55:00Z
6
value 0.00864
scoring_system epss
scoring_elements 0.75123
published_at 2026-04-11T12:55:00Z
7
value 0.00864
scoring_system epss
scoring_elements 0.75101
published_at 2026-04-12T12:55:00Z
8
value 0.00864
scoring_system epss
scoring_elements 0.75091
published_at 2026-04-13T12:55:00Z
9
value 0.00864
scoring_system epss
scoring_elements 0.75129
published_at 2026-04-16T12:55:00Z
10
value 0.00864
scoring_system epss
scoring_elements 0.75136
published_at 2026-04-18T12:55:00Z
11
value 0.00864
scoring_system epss
scoring_elements 0.75126
published_at 2026-04-21T12:55:00Z
12
value 0.00864
scoring_system epss
scoring_elements 0.75164
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1689
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=841351
reference_id 841351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=841351
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
fixed_packages
aliases CVE-2012-1689
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wgd-zetu-myef
4
url VCID-7w4n-33x1-tqcq
vulnerability_id VCID-7w4n-33x1-tqcq
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3173.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3173.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3173
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69912
published_at 2026-04-24T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69767
published_at 2026-04-01T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69779
published_at 2026-04-02T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-04T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69771
published_at 2026-04-07T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69819
published_at 2026-04-08T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69834
published_at 2026-04-09T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69857
published_at 2026-04-11T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69842
published_at 2026-04-12T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-13T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69869
published_at 2026-04-16T12:55:00Z
11
value 0.00613
scoring_system epss
scoring_elements 0.69879
published_at 2026-04-18T12:55:00Z
12
value 0.00613
scoring_system epss
scoring_elements 0.69861
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3173
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79386
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79386
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867217
reference_id 867217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867217
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3173
reference_id CVE-2012-3173
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3173
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3173
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7w4n-33x1-tqcq
5
url VCID-96an-9mvp-3kat
vulnerability_id VCID-96an-9mvp-3kat
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1690.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1690.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1690
reference_id
reference_type
scores
0
value 0.00719
scoring_system epss
scoring_elements 0.72413
published_at 2026-04-07T12:55:00Z
1
value 0.00719
scoring_system epss
scoring_elements 0.72418
published_at 2026-04-02T12:55:00Z
2
value 0.00719
scoring_system epss
scoring_elements 0.72436
published_at 2026-04-04T12:55:00Z
3
value 0.00719
scoring_system epss
scoring_elements 0.72451
published_at 2026-04-08T12:55:00Z
4
value 0.00719
scoring_system epss
scoring_elements 0.72464
published_at 2026-04-09T12:55:00Z
5
value 0.00719
scoring_system epss
scoring_elements 0.72487
published_at 2026-04-11T12:55:00Z
6
value 0.00719
scoring_system epss
scoring_elements 0.72469
published_at 2026-04-12T12:55:00Z
7
value 0.00719
scoring_system epss
scoring_elements 0.72459
published_at 2026-04-13T12:55:00Z
8
value 0.00719
scoring_system epss
scoring_elements 0.72501
published_at 2026-04-16T12:55:00Z
9
value 0.00719
scoring_system epss
scoring_elements 0.7251
published_at 2026-04-18T12:55:00Z
10
value 0.00719
scoring_system epss
scoring_elements 0.725
published_at 2026-04-21T12:55:00Z
11
value 0.00719
scoring_system epss
scoring_elements 0.72542
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1690
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814287
reference_id 814287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814287
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
fixed_packages
aliases CVE-2012-1690
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96an-9mvp-3kat
6
url VCID-9te6-rj9t-3fgb
vulnerability_id VCID-9te6-rj9t-3fgb
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3177.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3177.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3177
reference_id
reference_type
scores
0
value 0.00704
scoring_system epss
scoring_elements 0.72165
published_at 2026-04-24T12:55:00Z
1
value 0.00704
scoring_system epss
scoring_elements 0.72042
published_at 2026-04-01T12:55:00Z
2
value 0.00704
scoring_system epss
scoring_elements 0.72048
published_at 2026-04-02T12:55:00Z
3
value 0.00704
scoring_system epss
scoring_elements 0.72069
published_at 2026-04-04T12:55:00Z
4
value 0.00704
scoring_system epss
scoring_elements 0.72045
published_at 2026-04-07T12:55:00Z
5
value 0.00704
scoring_system epss
scoring_elements 0.72082
published_at 2026-04-08T12:55:00Z
6
value 0.00704
scoring_system epss
scoring_elements 0.72094
published_at 2026-04-09T12:55:00Z
7
value 0.00704
scoring_system epss
scoring_elements 0.72117
published_at 2026-04-11T12:55:00Z
8
value 0.00704
scoring_system epss
scoring_elements 0.72101
published_at 2026-04-12T12:55:00Z
9
value 0.00704
scoring_system epss
scoring_elements 0.72087
published_at 2026-04-13T12:55:00Z
10
value 0.00704
scoring_system epss
scoring_elements 0.72128
published_at 2026-04-16T12:55:00Z
11
value 0.00704
scoring_system epss
scoring_elements 0.72136
published_at 2026-04-18T12:55:00Z
12
value 0.00704
scoring_system epss
scoring_elements 0.72121
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3177
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79383
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79383
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867215
reference_id 867215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867215
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3177
reference_id CVE-2012-3177
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3177
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3177
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9te6-rj9t-3fgb
7
url VCID-h2g4-xr4z-ryh1
vulnerability_id VCID-h2g4-xr4z-ryh1
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0540.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0540.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0540
reference_id
reference_type
scores
0
value 0.00864
scoring_system epss
scoring_elements 0.75047
published_at 2026-04-01T12:55:00Z
1
value 0.00864
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-02T12:55:00Z
2
value 0.00864
scoring_system epss
scoring_elements 0.75078
published_at 2026-04-04T12:55:00Z
3
value 0.00864
scoring_system epss
scoring_elements 0.75055
published_at 2026-04-07T12:55:00Z
4
value 0.00864
scoring_system epss
scoring_elements 0.75089
published_at 2026-04-08T12:55:00Z
5
value 0.00864
scoring_system epss
scoring_elements 0.751
published_at 2026-04-09T12:55:00Z
6
value 0.00864
scoring_system epss
scoring_elements 0.75123
published_at 2026-04-11T12:55:00Z
7
value 0.00864
scoring_system epss
scoring_elements 0.75101
published_at 2026-04-12T12:55:00Z
8
value 0.00864
scoring_system epss
scoring_elements 0.75091
published_at 2026-04-13T12:55:00Z
9
value 0.00864
scoring_system epss
scoring_elements 0.75129
published_at 2026-04-16T12:55:00Z
10
value 0.00864
scoring_system epss
scoring_elements 0.75136
published_at 2026-04-18T12:55:00Z
11
value 0.00864
scoring_system epss
scoring_elements 0.75126
published_at 2026-04-21T12:55:00Z
12
value 0.00864
scoring_system epss
scoring_elements 0.75164
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0540
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=841349
reference_id 841349
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=841349
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
fixed_packages
aliases CVE-2012-0540
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h2g4-xr4z-ryh1
8
url VCID-hz26-3f11-efbh
vulnerability_id VCID-hz26-3f11-efbh
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3167.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3167.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3167
reference_id
reference_type
scores
0
value 0.0043
scoring_system epss
scoring_elements 0.62571
published_at 2026-04-24T12:55:00Z
1
value 0.0043
scoring_system epss
scoring_elements 0.62421
published_at 2026-04-01T12:55:00Z
2
value 0.0043
scoring_system epss
scoring_elements 0.62479
published_at 2026-04-02T12:55:00Z
3
value 0.0043
scoring_system epss
scoring_elements 0.62511
published_at 2026-04-04T12:55:00Z
4
value 0.0043
scoring_system epss
scoring_elements 0.62478
published_at 2026-04-07T12:55:00Z
5
value 0.0043
scoring_system epss
scoring_elements 0.6253
published_at 2026-04-08T12:55:00Z
6
value 0.0043
scoring_system epss
scoring_elements 0.62546
published_at 2026-04-09T12:55:00Z
7
value 0.0043
scoring_system epss
scoring_elements 0.62565
published_at 2026-04-11T12:55:00Z
8
value 0.0043
scoring_system epss
scoring_elements 0.62553
published_at 2026-04-12T12:55:00Z
9
value 0.0043
scoring_system epss
scoring_elements 0.62531
published_at 2026-04-13T12:55:00Z
10
value 0.0043
scoring_system epss
scoring_elements 0.62572
published_at 2026-04-16T12:55:00Z
11
value 0.0043
scoring_system epss
scoring_elements 0.62578
published_at 2026-04-18T12:55:00Z
12
value 0.0043
scoring_system epss
scoring_elements 0.6256
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3167
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79392
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79392
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867230
reference_id 867230
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867230
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3167
reference_id CVE-2012-3167
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3167
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3167
risk_score 1.6
exploitability 0.5
weighted_severity 3.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hz26-3f11-efbh
9
url VCID-jwr1-6v3s-v3ff
vulnerability_id VCID-jwr1-6v3s-v3ff
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3180.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3180.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3180
reference_id
reference_type
scores
0
value 0.00613
scoring_system epss
scoring_elements 0.69912
published_at 2026-04-24T12:55:00Z
1
value 0.00613
scoring_system epss
scoring_elements 0.69767
published_at 2026-04-01T12:55:00Z
2
value 0.00613
scoring_system epss
scoring_elements 0.69779
published_at 2026-04-02T12:55:00Z
3
value 0.00613
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-04T12:55:00Z
4
value 0.00613
scoring_system epss
scoring_elements 0.69771
published_at 2026-04-07T12:55:00Z
5
value 0.00613
scoring_system epss
scoring_elements 0.69819
published_at 2026-04-08T12:55:00Z
6
value 0.00613
scoring_system epss
scoring_elements 0.69834
published_at 2026-04-09T12:55:00Z
7
value 0.00613
scoring_system epss
scoring_elements 0.69857
published_at 2026-04-11T12:55:00Z
8
value 0.00613
scoring_system epss
scoring_elements 0.69842
published_at 2026-04-12T12:55:00Z
9
value 0.00613
scoring_system epss
scoring_elements 0.69828
published_at 2026-04-13T12:55:00Z
10
value 0.00613
scoring_system epss
scoring_elements 0.69869
published_at 2026-04-16T12:55:00Z
11
value 0.00613
scoring_system epss
scoring_elements 0.69879
published_at 2026-04-18T12:55:00Z
12
value 0.00613
scoring_system epss
scoring_elements 0.69861
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3180
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79389
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79389
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867223
reference_id 867223
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867223
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3180
reference_id CVE-2012-3180
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3180
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3180
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwr1-6v3s-v3ff
10
url VCID-mwch-ragz-pycf
vulnerability_id VCID-mwch-ragz-pycf
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3163.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3163
reference_id
reference_type
scores
0
value 0.00955
scoring_system epss
scoring_elements 0.76485
published_at 2026-04-24T12:55:00Z
1
value 0.00955
scoring_system epss
scoring_elements 0.7636
published_at 2026-04-01T12:55:00Z
2
value 0.00955
scoring_system epss
scoring_elements 0.76364
published_at 2026-04-02T12:55:00Z
3
value 0.00955
scoring_system epss
scoring_elements 0.76393
published_at 2026-04-04T12:55:00Z
4
value 0.00955
scoring_system epss
scoring_elements 0.76375
published_at 2026-04-07T12:55:00Z
5
value 0.00955
scoring_system epss
scoring_elements 0.76408
published_at 2026-04-08T12:55:00Z
6
value 0.00955
scoring_system epss
scoring_elements 0.76422
published_at 2026-04-09T12:55:00Z
7
value 0.00955
scoring_system epss
scoring_elements 0.76448
published_at 2026-04-11T12:55:00Z
8
value 0.00955
scoring_system epss
scoring_elements 0.76426
published_at 2026-04-12T12:55:00Z
9
value 0.00955
scoring_system epss
scoring_elements 0.7642
published_at 2026-04-13T12:55:00Z
10
value 0.00955
scoring_system epss
scoring_elements 0.76461
published_at 2026-04-16T12:55:00Z
11
value 0.00955
scoring_system epss
scoring_elements 0.76466
published_at 2026-04-18T12:55:00Z
12
value 0.00955
scoring_system epss
scoring_elements 0.76451
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3163
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://secunia.com/advisories/56509
reference_id
reference_type
scores
url http://secunia.com/advisories/56509
7
reference_url http://secunia.com/advisories/56513
reference_id
reference_type
scores
url http://secunia.com/advisories/56513
8
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79381
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79381
10
reference_url http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html
reference_id
reference_type
scores
url http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html
11
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
13
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
14
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867212
reference_id 867212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867212
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.3.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_enterprise_manager:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.3.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3163
reference_id CVE-2012-3163
reference_type
scores
0
value 9.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3163
42
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
43
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
44
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3163
risk_score 4.0
exploitability 0.5
weighted_severity 8.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mwch-ragz-pycf
11
url VCID-pvbw-e9jc-wuam
vulnerability_id VCID-pvbw-e9jc-wuam
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3160.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3160.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3160
reference_id
reference_type
scores
0
value 0.00078
scoring_system epss
scoring_elements 0.22988
published_at 2026-04-24T12:55:00Z
1
value 0.00078
scoring_system epss
scoring_elements 0.23133
published_at 2026-04-01T12:55:00Z
2
value 0.00078
scoring_system epss
scoring_elements 0.23309
published_at 2026-04-02T12:55:00Z
3
value 0.00078
scoring_system epss
scoring_elements 0.23351
published_at 2026-04-04T12:55:00Z
4
value 0.00078
scoring_system epss
scoring_elements 0.2314
published_at 2026-04-07T12:55:00Z
5
value 0.00078
scoring_system epss
scoring_elements 0.23213
published_at 2026-04-08T12:55:00Z
6
value 0.00078
scoring_system epss
scoring_elements 0.23263
published_at 2026-04-09T12:55:00Z
7
value 0.00078
scoring_system epss
scoring_elements 0.23285
published_at 2026-04-11T12:55:00Z
8
value 0.00078
scoring_system epss
scoring_elements 0.23248
published_at 2026-04-12T12:55:00Z
9
value 0.00078
scoring_system epss
scoring_elements 0.2319
published_at 2026-04-13T12:55:00Z
10
value 0.00078
scoring_system epss
scoring_elements 0.23206
published_at 2026-04-16T12:55:00Z
11
value 0.00078
scoring_system epss
scoring_elements 0.23199
published_at 2026-04-18T12:55:00Z
12
value 0.00078
scoring_system epss
scoring_elements 0.2316
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3160
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79394
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79394
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
10
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
11
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867238
reference_id 867238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867238
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3160
reference_id CVE-2012-3160
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-3160
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3160
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pvbw-e9jc-wuam
12
url VCID-s5u4-c3yc-nqgd
vulnerability_id VCID-s5u4-c3yc-nqgd
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3158.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3158.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3158
reference_id
reference_type
scores
0
value 0.02532
scoring_system epss
scoring_elements 0.85489
published_at 2026-04-24T12:55:00Z
1
value 0.02532
scoring_system epss
scoring_elements 0.85368
published_at 2026-04-01T12:55:00Z
2
value 0.02532
scoring_system epss
scoring_elements 0.85381
published_at 2026-04-02T12:55:00Z
3
value 0.02532
scoring_system epss
scoring_elements 0.854
published_at 2026-04-04T12:55:00Z
4
value 0.02532
scoring_system epss
scoring_elements 0.85403
published_at 2026-04-07T12:55:00Z
5
value 0.02532
scoring_system epss
scoring_elements 0.85424
published_at 2026-04-08T12:55:00Z
6
value 0.02532
scoring_system epss
scoring_elements 0.85433
published_at 2026-04-09T12:55:00Z
7
value 0.02532
scoring_system epss
scoring_elements 0.85447
published_at 2026-04-11T12:55:00Z
8
value 0.02532
scoring_system epss
scoring_elements 0.85445
published_at 2026-04-12T12:55:00Z
9
value 0.02532
scoring_system epss
scoring_elements 0.85442
published_at 2026-04-13T12:55:00Z
10
value 0.02532
scoring_system epss
scoring_elements 0.85466
published_at 2026-04-21T12:55:00Z
11
value 0.02532
scoring_system epss
scoring_elements 0.8547
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3158
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79382
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79382
8
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:102
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:102
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
11
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
12
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867213
reference_id 867213
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867213
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3158
reference_id CVE-2012-3158
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3158
27
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
28
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
29
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3158
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s5u4-c3yc-nqgd
13
url VCID-s9t5-5q6j-hqd9
vulnerability_id VCID-s9t5-5q6j-hqd9
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html
reference_id
reference_type
scores
url http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2013-0180.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0180.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2749.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2749.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2749
reference_id
reference_type
scores
0
value 0.00515
scoring_system epss
scoring_elements 0.6665
published_at 2026-04-24T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66519
published_at 2026-04-01T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.66558
published_at 2026-04-02T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66583
published_at 2026-04-04T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66555
published_at 2026-04-07T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66603
published_at 2026-04-08T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66617
published_at 2026-04-09T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66635
published_at 2026-04-11T12:55:00Z
8
value 0.00515
scoring_system epss
scoring_elements 0.66623
published_at 2026-04-12T12:55:00Z
9
value 0.00515
scoring_system epss
scoring_elements 0.6659
published_at 2026-04-13T12:55:00Z
10
value 0.00515
scoring_system epss
scoring_elements 0.66626
published_at 2026-04-16T12:55:00Z
11
value 0.00515
scoring_system epss
scoring_elements 0.66641
published_at 2026-04-18T12:55:00Z
12
value 0.00515
scoring_system epss
scoring_elements 0.66625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2749
5
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
6
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
7
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
9
reference_url http://www.securityfocus.com/bid/55120
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55120
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=833737
reference_id 833737
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=833737
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2749
reference_id CVE-2012-2749
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-2749
107
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
108
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
109
reference_url https://access.redhat.com/errata/RHSA-2013:0180
reference_id RHSA-2013:0180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0180
fixed_packages
aliases CVE-2012-2749
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s9t5-5q6j-hqd9
14
url VCID-w3av-8ree-5bhp
vulnerability_id VCID-w3av-8ree-5bhp
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2012-1462.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1462.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3166.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3166
reference_id
reference_type
scores
0
value 0.00453
scoring_system epss
scoring_elements 0.63822
published_at 2026-04-24T12:55:00Z
1
value 0.00453
scoring_system epss
scoring_elements 0.63692
published_at 2026-04-01T12:55:00Z
2
value 0.00453
scoring_system epss
scoring_elements 0.63753
published_at 2026-04-02T12:55:00Z
3
value 0.00453
scoring_system epss
scoring_elements 0.63779
published_at 2026-04-04T12:55:00Z
4
value 0.00453
scoring_system epss
scoring_elements 0.63737
published_at 2026-04-07T12:55:00Z
5
value 0.00453
scoring_system epss
scoring_elements 0.63789
published_at 2026-04-08T12:55:00Z
6
value 0.00453
scoring_system epss
scoring_elements 0.63806
published_at 2026-04-09T12:55:00Z
7
value 0.00453
scoring_system epss
scoring_elements 0.6382
published_at 2026-04-11T12:55:00Z
8
value 0.00453
scoring_system epss
scoring_elements 0.63805
published_at 2026-04-21T12:55:00Z
9
value 0.00453
scoring_system epss
scoring_elements 0.63772
published_at 2026-04-13T12:55:00Z
10
value 0.00453
scoring_system epss
scoring_elements 0.63808
published_at 2026-04-16T12:55:00Z
11
value 0.00453
scoring_system epss
scoring_elements 0.63817
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3166
3
reference_url http://secunia.com/advisories/51177
reference_id
reference_type
scores
url http://secunia.com/advisories/51177
4
reference_url http://secunia.com/advisories/51309
reference_id
reference_type
scores
url http://secunia.com/advisories/51309
5
reference_url http://secunia.com/advisories/53372
reference_id
reference_type
scores
url http://secunia.com/advisories/53372
6
reference_url http://security.gentoo.org/glsa/glsa-201308-06.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201308-06.xml
7
reference_url http://www.debian.org/security/2012/dsa-2581
reference_id
reference_type
scores
url http://www.debian.org/security/2012/dsa-2581
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
9
reference_url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
10
reference_url http://www.ubuntu.com/usn/USN-1621-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1621-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=867216
reference_id 867216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=867216
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3166
reference_id CVE-2012-3166
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-3166
26
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
27
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
28
reference_url https://usn.ubuntu.com/1621-1/
reference_id USN-1621-1
reference_type
scores
url https://usn.ubuntu.com/1621-1/
fixed_packages
aliases CVE-2012-3166
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3av-8ree-5bhp
15
url VCID-wtwz-tx65-9yag
vulnerability_id VCID-wtwz-tx65-9yag
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1703.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1703.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1703
reference_id
reference_type
scores
0
value 0.00804
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-01T12:55:00Z
1
value 0.00804
scoring_system epss
scoring_elements 0.74083
published_at 2026-04-02T12:55:00Z
2
value 0.00804
scoring_system epss
scoring_elements 0.74109
published_at 2026-04-04T12:55:00Z
3
value 0.00804
scoring_system epss
scoring_elements 0.74082
published_at 2026-04-07T12:55:00Z
4
value 0.00804
scoring_system epss
scoring_elements 0.74114
published_at 2026-04-08T12:55:00Z
5
value 0.00804
scoring_system epss
scoring_elements 0.74129
published_at 2026-04-09T12:55:00Z
6
value 0.00804
scoring_system epss
scoring_elements 0.7415
published_at 2026-04-11T12:55:00Z
7
value 0.00804
scoring_system epss
scoring_elements 0.74132
published_at 2026-04-12T12:55:00Z
8
value 0.00804
scoring_system epss
scoring_elements 0.74126
published_at 2026-04-13T12:55:00Z
9
value 0.00804
scoring_system epss
scoring_elements 0.74164
published_at 2026-04-16T12:55:00Z
10
value 0.00804
scoring_system epss
scoring_elements 0.74173
published_at 2026-04-18T12:55:00Z
11
value 0.00804
scoring_system epss
scoring_elements 0.74163
published_at 2026-04-21T12:55:00Z
12
value 0.00804
scoring_system epss
scoring_elements 0.74199
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1703
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814293
reference_id 814293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814293
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
fixed_packages
aliases CVE-2012-1703
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wtwz-tx65-9yag
16
url VCID-y4mm-ffe6-jkhp
vulnerability_id VCID-y4mm-ffe6-jkhp
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2122.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2122.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2122
reference_id
reference_type
scores
0
value 0.93918
scoring_system epss
scoring_elements 0.99878
published_at 2026-04-11T12:55:00Z
1
value 0.93918
scoring_system epss
scoring_elements 0.99879
published_at 2026-04-24T12:55:00Z
2
value 0.93918
scoring_system epss
scoring_elements 0.9988
published_at 2026-04-18T12:55:00Z
3
value 0.94058
scoring_system epss
scoring_elements 0.99901
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2122
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=814605
reference_id 814605
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=814605
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/19092.py
reference_id OSVDB-82804;CVE-2012-2122
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/19092.py
5
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
6
reference_url https://usn.ubuntu.com/1467-1/
reference_id USN-1467-1
reference_type
scores
url https://usn.ubuntu.com/1467-1/
fixed_packages
aliases CVE-2012-2122
risk_score 1.6
exploitability 2.0
weighted_severity 0.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4mm-ffe6-jkhp
17
url VCID-yt8v-vgf9-ykgw
vulnerability_id VCID-yt8v-vgf9-ykgw
summary
Multiple vulnerabilities have been found in MySQL, allowing
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1734.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1734
reference_id
reference_type
scores
0
value 0.00542
scoring_system epss
scoring_elements 0.67605
published_at 2026-04-01T12:55:00Z
1
value 0.00542
scoring_system epss
scoring_elements 0.67641
published_at 2026-04-02T12:55:00Z
2
value 0.00542
scoring_system epss
scoring_elements 0.67662
published_at 2026-04-04T12:55:00Z
3
value 0.00542
scoring_system epss
scoring_elements 0.67642
published_at 2026-04-07T12:55:00Z
4
value 0.00542
scoring_system epss
scoring_elements 0.67693
published_at 2026-04-08T12:55:00Z
5
value 0.00542
scoring_system epss
scoring_elements 0.67708
published_at 2026-04-09T12:55:00Z
6
value 0.00542
scoring_system epss
scoring_elements 0.67731
published_at 2026-04-11T12:55:00Z
7
value 0.00542
scoring_system epss
scoring_elements 0.67716
published_at 2026-04-12T12:55:00Z
8
value 0.00542
scoring_system epss
scoring_elements 0.67683
published_at 2026-04-13T12:55:00Z
9
value 0.00542
scoring_system epss
scoring_elements 0.67719
published_at 2026-04-16T12:55:00Z
10
value 0.00542
scoring_system epss
scoring_elements 0.67732
published_at 2026-04-24T12:55:00Z
11
value 0.00542
scoring_system epss
scoring_elements 0.67713
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1734
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=841353
reference_id 841353
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=841353
3
reference_url https://security.gentoo.org/glsa/201308-06
reference_id GLSA-201308-06
reference_type
scores
url https://security.gentoo.org/glsa/201308-06
4
reference_url https://access.redhat.com/errata/RHSA-2012:1462
reference_id RHSA-2012:1462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1462
fixed_packages
aliases CVE-2012-1734
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yt8v-vgf9-ykgw
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.1.66-1%3Farch=el6_3