{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50926?format=json","vulnerability_id":"VCID-6wgd-zetu-myef","summary":"Multiple vulnerabilities have been found in MySQL, allowing\n    attackers to execute arbitrary code or cause Denial of Service.","aliases":[{"alias":"CVE-2012-1689"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79019?format=json","purl":"pkg:ebuild/dev-db/mysql@5.1.70","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/mysql@5.1.70"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/125705?format=json","purl":"pkg:rpm/redhat/mysql@5.1.66-1?arch=el6_3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2pdc-j83s-h7hh"},{"vulnerability":"VCID-2vb6-exwh-sybh"},{"vulnerability":"VCID-6fhd-9qpt-tfae"},{"vulnerability":"VCID-6wgd-zetu-myef"},{"vulnerability":"VCID-7w4n-33x1-tqcq"},{"vulnerability":"VCID-96an-9mvp-3kat"},{"vulnerability":"VCID-9te6-rj9t-3fgb"},{"vulnerability":"VCID-h2g4-xr4z-ryh1"},{"vulnerability":"VCID-hz26-3f11-efbh"},{"vulnerability":"VCID-jwr1-6v3s-v3ff"},{"vulnerability":"VCID-mwch-ragz-pycf"},{"vulnerability":"VCID-pvbw-e9jc-wuam"},{"vulnerability":"VCID-s5u4-c3yc-nqgd"},{"vulnerability":"VCID-s9t5-5q6j-hqd9"},{"vulnerability":"VCID-w3av-8ree-5bhp"},{"vulnerability":"VCID-wtwz-tx65-9yag"},{"vulnerability":"VCID-y4mm-ffe6-jkhp"},{"vulnerability":"VCID-yt8v-vgf9-ykgw"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/mysql@5.1.66-1%3Farch=el6_3"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1689.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1689","reference_id":"","reference_type":"","scores":[{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75049","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75078","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75055","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.751","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75091","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75126","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75181","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00864","scoring_system":"epss","scoring_elements":"0.75209","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1689"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=841351","reference_id":"841351","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=841351"},{"reference_url":"https://security.gentoo.org/glsa/201308-06","reference_id":"GLSA-201308-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201308-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1462","reference_id":"RHSA-2012:1462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1462"}],"weaknesses":[],"exploits":[],"severity_range_score":null,"exploitability":"0.5","weighted_severity":"0.0","risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6wgd-zetu-myef"}