{"url":"http://public2.vulnerablecode.io/api/packages/129384?format=json","purl":"pkg:rpm/redhat/mysql@4.1.22-2?arch=el4","type":"rpm","namespace":"redhat","name":"mysql","version":"4.1.22-2","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88698?format=json","vulnerability_id":"VCID-1kra-rh16-c7dr","summary":"mysql DROP privilege not enforced when renaming tables","references":[{"reference_url":"http://bugs.mysql.com/bug.php?id=27515","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.mysql.com/bug.php?id=27515"},{"reference_url":"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html","reference_id":"","reference_type":"","scores":[],"url":"http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html"},{"reference_url":"http://lists.mysql.com/announce/470","reference_id":"","reference_type":"","scores":[],"url":"http://lists.mysql.com/announce/470"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html"},{"reference_url":"http://osvdb.org/34766","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/34766"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2691.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2691","reference_id":"","reference_type":"","scores":[{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80185","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79951","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.7998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79968","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.79996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80005","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80025","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80009","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80001","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.8003","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80031","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80058","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.8008","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80093","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80115","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.8013","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80127","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01338","scoring_system":"epss","scoring_elements":"0.80143","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-2691"},{"reference_url":"http://secunia.com/advisories/25301","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25301"},{"reference_url":"http://secunia.com/advisories/25946","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25946"},{"reference_url":"http://secunia.com/advisories/26073","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26073"},{"reference_url":"http://secunia.com/advisories/26430","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26430"},{"reference_url":"http://secunia.com/advisories/27155","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27155"},{"reference_url":"http://secunia.com/advisories/27823","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/27823"},{"reference_url":"http://secunia.com/advisories/28838","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/28838"},{"reference_url":"http://secunia.com/advisories/30351","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/30351"},{"reference_url":"http://secunia.com/advisories/31226","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/31226"},{"reference_url":"http://secunia.com/advisories/32222","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32222"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34347","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34347"},{"reference_url":"https://issues.rpath.com/browse/RPL-1536","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1536"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559"},{"reference_url":"http://support.apple.com/kb/HT3216","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT3216"},{"reference_url":"http://www.debian.org/security/2007/dsa-1413","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1413"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:139","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:139"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0894.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0894.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0364.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0364.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2008-0768.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2008-0768.html"},{"reference_url":"http://www.securityfocus.com/archive/1/473874/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/473874/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/24016","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24016"},{"reference_url":"http://www.securityfocus.com/bid/31681","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/31681"},{"reference_url":"http://www.securitytracker.com/id?1018069","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018069"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1804","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1804"},{"reference_url":"http://www.vupen.com/english/advisories/2008/2780","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/2780"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=241688","reference_id":"241688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=241688"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2691","reference_id":"CVE-2007-2691","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-2691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0894","reference_id":"RHSA-2007:0894","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0894"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0364","reference_id":"RHSA-2008:0364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0768","reference_id":"RHSA-2008:0768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0768"},{"reference_url":"https://usn.ubuntu.com/528-1/","reference_id":"USN-528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/528-1/"}],"fixed_packages":[],"aliases":["CVE-2007-2691"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1kra-rh16-c7dr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88940?format=json","vulnerability_id":"VCID-3b84-ee53-pucj","summary":"MySQL improper permission revocation","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4031.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4031.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4031","reference_id":"","reference_type":"","scores":[{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46278","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46318","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46338","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46286","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46341","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46342","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46403","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46346","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46339","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46193","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46259","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.4628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46221","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46252","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46325","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4031"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=202246","reference_id":"202246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=202246"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0083","reference_id":"RHSA-2007:0083","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0083"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0364","reference_id":"RHSA-2008:0364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0768","reference_id":"RHSA-2008:0768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0768"},{"reference_url":"https://usn.ubuntu.com/338-1/","reference_id":"USN-338-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/338-1/"}],"fixed_packages":[],"aliases":["CVE-2006-4031"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3b84-ee53-pucj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46784?format=json","vulnerability_id":"VCID-d4ae-x3sb-gueq","summary":"An authenticated user can crash MySQL through invalid parameters to the\n    date_format function.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3469.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3469.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3469","reference_id":"","reference_type":"","scores":[{"value":"0.38924","scoring_system":"epss","scoring_elements":"0.97314","published_at":"2026-05-14T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97932","published_at":"2026-04-02T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97934","published_at":"2026-04-04T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97948","published_at":"2026-04-11T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97929","published_at":"2026-04-01T12:55:00Z"},{"value":"0.52837","scoring_system":"epss","scoring_elements":"0.97951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.98021","published_at":"2026-04-21T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.9802","published_at":"2026-04-26T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.9803","published_at":"2026-05-11T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.98027","published_at":"2026-05-07T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.98031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.98033","published_at":"2026-05-12T12:55:00Z"},{"value":"0.54103","scoring_system":"epss","scoring_elements":"0.98023","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3469"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=201904","reference_id":"201904","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=201904"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28234.txt","reference_id":"CVE-2006-3469;OSVDB-27416","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28234.txt"},{"reference_url":"https://www.securityfocus.com/bid/19032/info","reference_id":"CVE-2006-3469;OSVDB-27416","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/19032/info"},{"reference_url":"https://security.gentoo.org/glsa/200608-09","reference_id":"GLSA-200608-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0768","reference_id":"RHSA-2008:0768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0768"},{"reference_url":"https://usn.ubuntu.com/321-1/","reference_id":"USN-321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/321-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3469"],"risk_score":1.0,"exploitability":"2.0","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d4ae-x3sb-gueq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47595?format=json","vulnerability_id":"VCID-f5mq-1pem-cke2","summary":"A vulnerability in MySQL might allow users to bypass privileges and gain\n    access to other databases.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2079.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-2079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2079","reference_id":"","reference_type":"","scores":[{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68316","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68336","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68356","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68427","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68415","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.6842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68434","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68412","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.6846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68465","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.6847","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.6849","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68526","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68492","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68518","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00564","scoring_system":"epss","scoring_elements":"0.68574","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-2079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=445222","reference_id":"445222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=445222"},{"reference_url":"https://security.gentoo.org/glsa/200809-04","reference_id":"GLSA-200809-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200809-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0510","reference_id":"RHSA-2008:0510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0768","reference_id":"RHSA-2008:0768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1289","reference_id":"RHSA-2009:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1289"},{"reference_url":"https://usn.ubuntu.com/671-1/","reference_id":"USN-671-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/671-1/"}],"fixed_packages":[],"aliases":["CVE-2008-2079"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f5mq-1pem-cke2"}],"fixing_vulnerabilities":[],"risk_score":"2.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@4.1.22-2%3Farch=el4"}