Lookup for vulnerable packages by Package URL.

GET /api/packages/126070?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/126070?format=api",
    "purl": "pkg:rpm/redhat/mysql@5.1.61-1.el6_2?arch=1",
    "type": "rpm",
    "namespace": "redhat",
    "name": "mysql",
    "version": "5.1.61-1.el6_2",
    "qualifiers": {
        "arch": "1"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50904?format=api",
            "vulnerability_id": "VCID-2dwm-mnwk-c3ey",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0119.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0119.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0119",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70379",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70402",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7043",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70439",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7047",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70479",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70453",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0119"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783806",
                    "reference_id": "783806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783806"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0119"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dwm-mnwk-c3ey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50912?format=api",
            "vulnerability_id": "VCID-3z9y-my9e-yqfz",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0490",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76832",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7684",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76869",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76882",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7692",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.769",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76941",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76933",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76967",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76975",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76978",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0490"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783815",
                    "reference_id": "783815",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783815"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0490"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3z9y-my9e-yqfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50893?format=api",
            "vulnerability_id": "VCID-4x49-bz32-qya6",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71512",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71519",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71536",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71509",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7156",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71583",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71567",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71595",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7158",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71631",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71636",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7164",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71625",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00679",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7166",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0075"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783794",
                    "reference_id": "783794",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783794"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0075"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4x49-bz32-qya6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50906?format=api",
            "vulnerability_id": "VCID-7fs1-vmrc-pqg5",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64707",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64758",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6475",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64799",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64814",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64831",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64821",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6483",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64841",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64828",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64846",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64859",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64855",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64835",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00475",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64883",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0484"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783808",
                    "reference_id": "783808",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783808"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0484"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fs1-vmrc-pqg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50900?format=api",
            "vulnerability_id": "VCID-85wu-uaut-t3hs",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0115.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0115.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70379",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70402",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7043",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70439",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7047",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70479",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70453",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0115"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783802",
                    "reference_id": "783802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783802"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0115"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-85wu-uaut-t3hs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50897?format=api",
            "vulnerability_id": "VCID-8d9f-sagt-k3eb",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0112.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0112.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0112",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63334",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63421",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63387",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63439",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63457",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63474",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63422",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63456",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63464",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6345",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6348",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63476",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63448",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0112"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783799",
                    "reference_id": "783799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783799"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0112"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8d9f-sagt-k3eb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50895?format=api",
            "vulnerability_id": "VCID-aa19-fvw2-3ya3",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0101",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76567",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76572",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76601",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76613",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7665",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76621",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76662",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76666",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76655",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76686",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76693",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76706",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76724",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0101"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783797",
                    "reference_id": "783797",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783797"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0101"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aa19-fvw2-3ya3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50905?format=api",
            "vulnerability_id": "VCID-aws5-3pjj-67ff",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0120.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0120.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0120",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70379",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70402",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7043",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70439",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7047",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70479",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70453",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0120"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783807",
                    "reference_id": "783807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783807"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0120"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aws5-3pjj-67ff"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50903?format=api",
            "vulnerability_id": "VCID-dug3-bb4u-k7c5",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0118.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0118.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63335",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63421",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63387",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63439",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63457",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63474",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63458",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63422",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63456",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63464",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6345",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63467",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6348",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63476",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63448",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0118"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783805",
                    "reference_id": "783805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783805"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0118"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dug3-bb4u-k7c5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50899?format=api",
            "vulnerability_id": "VCID-feek-dtxs-cqak",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0114",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14832",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14882",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14958",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1476",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14851",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14905",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14829",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14664",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14672",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14731",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14767",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14702",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14579",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14712",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0114"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783801",
                    "reference_id": "783801",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0114"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-feek-dtxs-cqak"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50896?format=api",
            "vulnerability_id": "VCID-fsnd-z8mg-2uep",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0102",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76567",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76572",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76601",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76613",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7665",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76621",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76662",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76666",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76655",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76686",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76693",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76706",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76724",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0102"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783798",
                    "reference_id": "783798",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783798"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0102"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsnd-z8mg-2uep"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50924?format=api",
            "vulnerability_id": "VCID-jvfj-keqk-hygj",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0583.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0583.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69003",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6902",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6904",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69021",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69071",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6909",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69113",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69098",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69069",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69108",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69117",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69096",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69146",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69154",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69162",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69142",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00586",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69185",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0583"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=814282",
                    "reference_id": "814282",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814282"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0583"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvfj-keqk-hygj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50898?format=api",
            "vulnerability_id": "VCID-nnny-64w7-4kce",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0113.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0113.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70339",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70334",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70379",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70417",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70402",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70388",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7043",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70439",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70419",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7047",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70479",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70453",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70492",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0113"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783800",
                    "reference_id": "783800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783800"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0113"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnny-64w7-4kce"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50894?format=api",
            "vulnerability_id": "VCID-nqan-6nvn-yycy",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76832",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7684",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76869",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76882",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7692",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.769",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76895",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76941",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76933",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76967",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76975",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76987",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76978",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00992",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77007",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0087"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783795",
                    "reference_id": "783795",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783795"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127",
                    "reference_id": "RHSA-2012:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0127"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0087"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqan-6nvn-yycy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50892?format=api",
            "vulnerability_id": "VCID-v9xa-9y2w-fbev",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2262.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2262.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73529",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73538",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73561",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73532",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73569",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73582",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73605",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73587",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73579",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73622",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73632",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73623",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73657",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73666",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73665",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7366",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00773",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73685",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2262"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783793",
                    "reference_id": "783793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783793"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2011-2262"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9xa-9y2w-fbev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50901?format=api",
            "vulnerability_id": "VCID-w6rb-eugj-qkc4",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0116.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0116.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45368",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45442",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45463",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45408",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45462",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45484",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45454",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45456",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45506",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45503",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45453",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45369",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45379",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45318",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45214",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45278",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0116"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783803",
                    "reference_id": "783803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783803"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0116"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w6rb-eugj-qkc4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50914?format=api",
            "vulnerability_id": "VCID-wwht-gbat-6ygr",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74369",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74374",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74401",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74376",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74408",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74425",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74426",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74418",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74455",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74463",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74453",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74488",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74495",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74493",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00822",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74521",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0492"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783817",
                    "reference_id": "783817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783817"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0492"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wwht-gbat-6ygr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50907?format=api",
            "vulnerability_id": "VCID-wy49-zhyv-kqhx",
            "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0485.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0485.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76567",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76572",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76601",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76613",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76624",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7665",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7663",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76621",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76662",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76666",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76655",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76686",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76693",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76706",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0097",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76724",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0485"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783809",
                    "reference_id": "783809",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783809"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201308-06",
                    "reference_id": "GLSA-201308-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201308-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105",
                    "reference_id": "RHSA-2012:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1397-1/",
                    "reference_id": "USN-1397-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1397-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0485"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wy49-zhyv-kqhx"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.1.61-1.el6_2%3Farch=1"
}