{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50903?format=json","vulnerability_id":"VCID-dug3-bb4u-k7c5","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","aliases":[{"alias":"CVE-2012-0118"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79019?format=json","purl":"pkg:ebuild/dev-db/mysql@5.1.70","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.1.70"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/126070?format=json","purl":"pkg:rpm/redhat/mysql@5.1.61-1.el6_2?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2dwm-mnwk-c3ey"},{"vulnerability":"VCID-3z9y-my9e-yqfz"},{"vulnerability":"VCID-4x49-bz32-qya6"},{"vulnerability":"VCID-7fs1-vmrc-pqg5"},{"vulnerability":"VCID-85wu-uaut-t3hs"},{"vulnerability":"VCID-8d9f-sagt-k3eb"},{"vulnerability":"VCID-aa19-fvw2-3ya3"},{"vulnerability":"VCID-aws5-3pjj-67ff"},{"vulnerability":"VCID-dug3-bb4u-k7c5"},{"vulnerability":"VCID-feek-dtxs-cqak"},{"vulnerability":"VCID-fsnd-z8mg-2uep"},{"vulnerability":"VCID-jvfj-keqk-hygj"},{"vulnerability":"VCID-nnny-64w7-4kce"},{"vulnerability":"VCID-nqan-6nvn-yycy"},{"vulnerability":"VCID-v9xa-9y2w-fbev"},{"vulnerability":"VCID-w6rb-eugj-qkc4"},{"vulnerability":"VCID-wwht-gbat-6ygr"},{"vulnerability":"VCID-wy49-zhyv-kqhx"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.1.61-1.el6_2%3Farch=1"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0118.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0118.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0118","reference_id":"","reference_type":"","scores":[{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63439","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63457","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63474","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63464","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6345","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63467","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63476","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63448","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63492","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63545","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6351","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63537","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0118"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=783805","reference_id":"783805","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=783805"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0105","reference_id":"RHSA-2012:0105","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0105"},{"reference_url":"https://usn.ubuntu.com/1397-1/","reference_id":"USN-1397-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1397-1/"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dug3-bb4u-k7c5"}