Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/126236?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/126236?format=api", "purl": "pkg:rpm/redhat/mysql@5.0.95-1.el5_7?arch=1", "type": "rpm", "namespace": "redhat", "name": "mysql", "version": "5.0.95-1.el5_7", "qualifiers": { "arch": "1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50912?format=api", "vulnerability_id": "VCID-3z9y-my9e-yqfz", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0490", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76869", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76941", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76978", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0490" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783815", "reference_id": "783815", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783815" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0490" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3z9y-my9e-yqfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50893?format=api", "vulnerability_id": "VCID-4x49-bz32-qya6", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0075", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71512", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71519", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71536", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71549", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7156", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71583", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71595", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7158", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71631", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71636", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.7164", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00679", "scoring_system": "epss", "scoring_elements": "0.71625", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0075" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783794", "reference_id": "783794", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783794" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0075" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4x49-bz32-qya6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50906?format=api", "vulnerability_id": "VCID-7fs1-vmrc-pqg5", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0484", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64707", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64758", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6475", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64799", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64831", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64821", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64792", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.6483", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64841", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64828", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64846", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64859", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64855", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64835", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0484" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783808", "reference_id": "783808", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783808" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0484" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7fs1-vmrc-pqg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50895?format=api", "vulnerability_id": "VCID-aa19-fvw2-3ya3", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0101", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76686", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76693", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0101" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783797", "reference_id": "783797", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783797" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0101" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aa19-fvw2-3ya3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50899?format=api", "vulnerability_id": "VCID-feek-dtxs-cqak", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0114", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14958", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1476", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14905", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14866", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14664", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14672", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14731", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14767", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14702", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14579", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0114" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783801", "reference_id": "783801", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783801" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0114" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-feek-dtxs-cqak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50896?format=api", "vulnerability_id": "VCID-fsnd-z8mg-2uep", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0102", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76572", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76581", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.7663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76621", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76662", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76655", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76686", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76693", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0097", "scoring_system": "epss", "scoring_elements": "0.76706", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0102" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783798", "reference_id": "783798", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783798" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0102" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsnd-z8mg-2uep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50894?format=api", "vulnerability_id": "VCID-nqan-6nvn-yycy", "summary": "Multiple vulnerabilities have been found in MySQL, allowing\n attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0087", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76832", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76869", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76851", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.7692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.769", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76895", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76941", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76975", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76987", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00992", "scoring_system": "epss", "scoring_elements": "0.76978", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0087" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=783795", "reference_id": "783795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783795" }, { "reference_url": "https://security.gentoo.org/glsa/201308-06", "reference_id": "GLSA-201308-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201308-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0105", "reference_id": "RHSA-2012:0105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0105" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0087" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nqan-6nvn-yycy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56611?format=api", "vulnerability_id": "VCID-r3w8-bwgt-k3hb", "summary": "Multiple vulnerabilities were found in MySQL, some of which may\n allow execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.mysql.com/bug.php?id=50974", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "reference_url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "reference_url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.mysql.com/commits/106060", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.mysql.com/commits/106060" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1849.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1849.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1849", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83305", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83207", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83203", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83239", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.8324", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83243", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83265", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83273", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01894", "scoring_system": "epss", "scoring_elements": "0.83281", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.84986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.85", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.85017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.85022", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.85044", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.85051", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.024", "scoring_system": "epss", "scoring_elements": "0.85067", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1849" }, { "reference_url": "http://securitytracker.com/id?1024032", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024032" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1397-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=592086", "reference_id": "592086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592086" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1849", "reference_id": "CVE-2010-1849", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1849" }, { "reference_url": "https://security.gentoo.org/glsa/201201-02", "reference_id": "GLSA-201201-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201201-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0127", "reference_id": "RHSA-2012:0127", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0127" }, { "reference_url": "https://usn.ubuntu.com/1397-1/", "reference_id": "USN-1397-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1397-1/" }, { "reference_url": "https://usn.ubuntu.com/950-1/", "reference_id": "USN-950-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/950-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-1849" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3w8-bwgt-k3hb" } ], "fixing_vulnerabilities": [], "risk_score": "2.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.0.95-1.el5_7%3Farch=1" }