Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/126070?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/126070?format=api", "purl": "pkg:rpm/redhat/mysql@5.1.61-1.el6_2?arch=1", "type": "rpm", "namespace": "redhat", "name": "mysql", "version": "5.1.61-1.el6_2", "qualifiers": { "arch": "1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50904?format=api", "vulnerability_id": "VCID-2dwm-mnwk-c3ey", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0119.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0119.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7047", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70453", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0119" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783806", "reference_id": "783806", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783806" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0119" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dwm-mnwk-c3ey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50912?format=api", "vulnerability_id": "VCID-3z9y-my9e-yqfz", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76869", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76941", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76978", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.77007", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783815", "reference_id": "783815", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783815" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0490" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3z9y-my9e-yqfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50893?format=api", "vulnerability_id": "VCID-4x49-bz32-qya6", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71512", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71536", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7156", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71595", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71631", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71636", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71625", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7166", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0075" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783794", "reference_id": "783794", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783794" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0075" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4x49-bz32-qya6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50906?format=api", "vulnerability_id": "VCID-7fs1-vmrc-pqg5", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64707", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64758", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64831", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64821", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6483", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64841", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64859", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64855", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64835", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64883", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783808", "reference_id": "783808", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783808" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0484" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fs1-vmrc-pqg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50900?format=api", "vulnerability_id": "VCID-85wu-uaut-t3hs", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0115.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0115.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0115", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7047", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70453", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0115" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783802", "reference_id": "783802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783802" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0115" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-85wu-uaut-t3hs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50897?format=api", "vulnerability_id": "VCID-8d9f-sagt-k3eb", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0112.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63334", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63421", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63439", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63422", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63456", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6345", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63467", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6348", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63476", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63448", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0112" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783799", "reference_id": "783799", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783799" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0112" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8d9f-sagt-k3eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50895?format=api", "vulnerability_id": "VCID-aa19-fvw2-3ya3", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0101", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76686", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76693", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76724", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0101" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783797", "reference_id": "783797", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783797" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0101" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aa19-fvw2-3ya3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50905?format=api", "vulnerability_id": "VCID-aws5-3pjj-67ff", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0120.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0120.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0120", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7047", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70453", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0120" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783807", "reference_id": "783807", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783807" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0120" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aws5-3pjj-67ff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50903?format=api", "vulnerability_id": "VCID-dug3-bb4u-k7c5", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0118.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0118.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63335", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63421", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63387", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63439", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63457", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63422", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63456", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63464", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6345", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63467", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6348", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63476", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63448", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0118" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783805", "reference_id": "783805", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783805" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0118" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dug3-bb4u-k7c5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50899?format=api", "vulnerability_id": "VCID-feek-dtxs-cqak", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1476", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14731", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14767", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14702", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14579", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14712", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0114" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783801", "reference_id": "783801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783801" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0114" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-feek-dtxs-cqak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50896?format=api", "vulnerability_id": "VCID-fsnd-z8mg-2uep", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76686", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76693", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76724", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0102" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783798", "reference_id": "783798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783798" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0102" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsnd-z8mg-2uep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50924?format=api", "vulnerability_id": "VCID-jvfj-keqk-hygj", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0583.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0583.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69003", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.6902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.6904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69021", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69071", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.6909", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69113", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69098", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69069", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69108", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69117", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69096", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69146", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69154", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69162", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69142", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00586", "scoring_system": "epss", "scoring_elements": "0.69185", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0583" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=814282", "reference_id": "814282", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=814282" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0583" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jvfj-keqk-hygj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50898?format=api", "vulnerability_id": "VCID-nnny-64w7-4kce", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0113.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0113.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0113", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70326", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70417", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70402", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7043", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.7047", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70453", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0113" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783800", "reference_id": "783800", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783800" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0113" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnny-64w7-4kce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50894?format=api", "vulnerability_id": "VCID-nqan-6nvn-yycy", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76869", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76941", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76978", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.77007", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783795", "reference_id": "783795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783795" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0087" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqan-6nvn-yycy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50892?format=api", "vulnerability_id": "VCID-v9xa-9y2w-fbev", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2262.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2262.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2262", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73529", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73538", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73532", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73605", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73587", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73579", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73622", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73632", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73623", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73657", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73666", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73665", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.7366", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00773", "scoring_system": "epss", "scoring_elements": "0.73685", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2262" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783793", "reference_id": "783793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783793" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-2262" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9xa-9y2w-fbev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50901?format=api", "vulnerability_id": "VCID-w6rb-eugj-qkc4", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0116.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0116.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0116", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45368", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45442", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45463", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45462", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45484", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45454", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45456", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45503", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45453", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45369", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45379", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45318", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45214", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45278", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783803", "reference_id": "783803", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783803" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0116" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w6rb-eugj-qkc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50914?format=api", "vulnerability_id": "VCID-wwht-gbat-6ygr", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0492.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0492.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0492", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74369", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74401", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74376", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74425", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74426", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74418", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74455", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74463", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74453", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74488", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74495", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74493", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00822", "scoring_system": "epss", "scoring_elements": "0.74521", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783817", "reference_id": "783817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783817" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0492" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wwht-gbat-6ygr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50907?format=api", "vulnerability_id": "VCID-wy49-zhyv-kqhx", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0485.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76686", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76693", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76724", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0485" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783809", "reference_id": "783809", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783809" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0485" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wy49-zhyv-kqhx" } ], "fixing_vulnerabilities": [], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.1.61-1.el6_2%3Farch=1" }