{"url":"http://public2.vulnerablecode.io/api/packages/126236?format=json","purl":"pkg:rpm/redhat/mysql@5.0.95-1.el5_7?arch=1","type":"rpm","namespace":"redhat","name":"mysql","version":"5.0.95-1.el5_7","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50912?format=json","vulnerability_id":"VCID-3z9y-my9e-yqfz","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0490","reference_id":"","reference_type":"","scores":[{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.7684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.7692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76967","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76975","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76978","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77007","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77026","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77029","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0490"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783815","reference_id":"783815","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783815"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0490"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3z9y-my9e-yqfz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50893?format=json","vulnerability_id":"VCID-4x49-bz32-qya6","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0075","reference_id":"","reference_type":"","scores":[{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71512","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71519","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71536","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71509","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7156","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71583","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71567","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.716","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7158","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71631","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71625","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7166","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.71693","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00679","scoring_system":"epss","scoring_elements":"0.7169","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0075"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783794","reference_id":"783794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783794"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0075"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4x49-bz32-qya6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50906?format=json","vulnerability_id":"VCID-7fs1-vmrc-pqg5","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0484","reference_id":"","reference_type":"","scores":[{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64707","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64787","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6475","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64799","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64814","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64831","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6483","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64841","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64855","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64835","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64883","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64927","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64896","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64917","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783808","reference_id":"783808","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783808"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0484"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fs1-vmrc-pqg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50895?format=json","vulnerability_id":"VCID-aa19-fvw2-3ya3","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0101.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0101","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76567","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76741","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76729","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76746","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0101"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783797","reference_id":"783797","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783797"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0101"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aa19-fvw2-3ya3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50899?format=json","vulnerability_id":"VCID-feek-dtxs-cqak","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0114","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14958","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1476","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14905","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14672","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14731","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14702","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14712","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14801","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14837","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0114"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783801","reference_id":"783801","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783801"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0114"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-feek-dtxs-cqak"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50896?format=json","vulnerability_id":"VCID-fsnd-z8mg-2uep","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0102.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0102","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76567","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76572","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76662","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76741","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76729","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76746","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0102"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783798","reference_id":"783798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783798"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0102"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fsnd-z8mg-2uep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50894?format=json","vulnerability_id":"VCID-nqan-6nvn-yycy","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0087.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0087","reference_id":"","reference_type":"","scores":[{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.7684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76893","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.7692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76895","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76967","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76975","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.76978","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77007","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77026","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00992","scoring_system":"epss","scoring_elements":"0.77029","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0087"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783795","reference_id":"783795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783795"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0087"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nqan-6nvn-yycy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56611?format=json","vulnerability_id":"VCID-r3w8-bwgt-k3hb","summary":"Multiple vulnerabilities were found in MySQL, some of which may\n    allow execution of arbitrary code.","references":[{"reference_url":"http://bugs.mysql.com/bug.php?id=50974","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.mysql.com/bug.php?id=50974"},{"reference_url":"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html","reference_id":"","reference_type":"","scores":[],"url":"http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html"},{"reference_url":"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html","reference_id":"","reference_type":"","scores":[],"url":"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html"},{"reference_url":"http://lists.mysql.com/commits/106060","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mysql.com/commits/106060"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1849.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1849","reference_id":"","reference_type":"","scores":[{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83363","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83243","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83265","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83281","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83305","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83326","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83346","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83347","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.83239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01894","scoring_system":"epss","scoring_elements":"0.8324","published_at":"2026-04-18T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.84986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.85","published_at":"2026-04-02T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.85017","published_at":"2026-04-04T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.85022","published_at":"2026-04-07T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.85044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.85051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.024","scoring_system":"epss","scoring_elements":"0.85067","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1849"},{"reference_url":"http://securitytracker.com/id?1024032","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024032"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328"},{"reference_url":"http://support.apple.com/kb/HT4435","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT4435"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:107","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:107"},{"reference_url":"http://www.ubuntu.com/usn/USN-1397-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1397-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=592086","reference_id":"592086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=592086"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1849","reference_id":"CVE-2010-1849","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-1849"},{"reference_url":"https://security.gentoo.org/glsa/201201-02","reference_id":"GLSA-201201-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201201-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0127","reference_id":"RHSA-2012:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0127"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"},{"reference_url":"https://usn.ubuntu.com/950-1/","reference_id":"USN-950-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/950-1/"}],"fixed_packages":[],"aliases":["CVE-2010-1849"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r3w8-bwgt-k3hb"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.0.95-1.el5_7%3Farch=1"}