Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/125129?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/125129?format=api", "purl": "pkg:rpm/redhat/mysql@5.1.67-1?arch=el6_3", "type": "rpm", "namespace": "redhat", "name": "mysql", "version": "5.1.67-1", "qualifiers": { "arch": "el6_3" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50966?format=api", "vulnerability_id": "VCID-285x-ecse-83f1", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0384.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0384.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0384", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80671", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.8056", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80552", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80582", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80585", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80611", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.8063", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80648", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0384" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896062", "reference_id": "896062", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896062" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0384", "reference_id": "CVE-2013-0384", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0384" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-0384" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-285x-ecse-83f1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50965?format=api", "vulnerability_id": "VCID-638y-rrfh-hkaa", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0383.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68548", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68373", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68394", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.6839", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68439", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68477", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.6849", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68468", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68517", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68528", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00565", "scoring_system": "epss", "scoring_elements": "0.68506", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0383" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896070", "reference_id": "896070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896070" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0383", "reference_id": "CVE-2013-0383", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0383" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-0383" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-638y-rrfh-hkaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50963?format=api", "vulnerability_id": "VCID-7seq-cmfe-uyen", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0375.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60408", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60362", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60252", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60328", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60354", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60323", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60372", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60388", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60409", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60376", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60417", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60424", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.604", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60415", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00396", "scoring_system": "epss", "scoring_elements": "0.60403", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0375" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17175", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17175" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896067", "reference_id": "896067", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896067" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0375", "reference_id": "CVE-2013-0375", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:N" }, { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0375" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-0375" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7seq-cmfe-uyen" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50930?format=api", "vulnerability_id": "VCID-fybv-u6bd-sfeh", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1702.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1702.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1702", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74246", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74096", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74102", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.741", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74133", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74147", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74169", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74182", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.7419", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74181", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74216", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74226", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74224", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00805", "scoring_system": "epss", "scoring_elements": "0.74219", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1702" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896069", "reference_id": "896069", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896069" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1702", "reference_id": "CVE-2012-1702", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1702" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1702" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fybv-u6bd-sfeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50932?format=api", "vulnerability_id": "VCID-hs2c-rkxz-p3a6", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1705.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1705.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1705", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70484", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70493", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.7058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.7063", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.7064", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70639", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70615", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1705" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896078", "reference_id": "896078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896078" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1705", "reference_id": "CVE-2012-1705", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1705" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-1705" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hs2c-rkxz-p3a6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50921?format=api", "vulnerability_id": "VCID-hygq-5ude-h3fb", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0572.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0572.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0572", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70655", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70484", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70516", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70493", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70555", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70602", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.7058", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.7063", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.7064", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70639", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0064", "scoring_system": "epss", "scoring_elements": "0.70615", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0572" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896072", "reference_id": "896072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896072" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0572", "reference_id": "CVE-2012-0572", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0572" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0572" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hygq-5ude-h3fb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50967?format=api", "vulnerability_id": "VCID-mymq-fyg4-cfaj", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0385.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21417", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21607", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2178", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21663", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2172", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21636", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21634", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21641", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.2161", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21462", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21456", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21444", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00071", "scoring_system": "epss", "scoring_elements": "0.21351", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0385" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896066", "reference_id": "896066", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896066" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0385", "reference_id": "CVE-2013-0385", "reference_type": "", "scores": [ { "value": "6.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0385" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-0385" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mymq-fyg4-cfaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50922?format=api", "vulnerability_id": "VCID-ushm-ycfu-cqcq", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=135109152819176&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0574.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0574.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71972", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71826", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71855", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71828", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71878", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71884", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71909", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71914", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71898", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71943", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71948", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71945", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00694", "scoring_system": "epss", "scoring_elements": "0.71937", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0574" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896076", "reference_id": "896076", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896076" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0574", "reference_id": "CVE-2012-0574", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0574" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0574" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ushm-ycfu-cqcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50970?format=api", "vulnerability_id": "VCID-wkpj-s43j-b7hu", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0219.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0389.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0389.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0389", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80671", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80499", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80505", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80527", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80574", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.8056", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80552", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80581", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80582", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80585", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80611", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80614", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.8063", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01415", "scoring_system": "epss", "scoring_elements": "0.80648", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0389" }, { "reference_url": "http://secunia.com/advisories/53372", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53372" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201308-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1703-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1703-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=896063", "reference_id": "896063", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=896063" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:10.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0389", "reference_id": "CVE-2013-0389", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0389" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0219", "reference_id": "RHSA-2013:0219", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0219" }, { "reference_url": "https://usn.ubuntu.com/1703-1/", "reference_id": "USN-1703-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1703-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-0389" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkpj-s43j-b7hu" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.1.67-1%3Farch=el6_3" }