162.215.130.50
{
"scan_id": 1749440556,
"ip": "162.215.130.50",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "162.215.128.0/18",
"postal_code": "",
"coordinates": {
"latitude": "37.751",
"longitude": "-97.822"
},
"geo_point": "37.751, -97.822",
"locale_code": "en",
"continent": "North America",
"country_code": "US",
"country_name": "United States",
"city": ""
},
"location_updated_at": "2025-06-09T16:40:23Z",
"asn": {
"number": "AS46606",
"organization": "UNIFIEDLAYER-AS-1",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "162.214.0.0/15",
"organization": "Unified Layer",
"descr": "Unified Layer",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2025-02-04T15:05:03Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-06-09T16:40:23Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-06-09T23:02:18Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-06-09T16:40:23Z"
}
],
"hostnames": [
{
"name": "162-215-130-50.unifiedlayer.com",
"last_updated_at": "2025-06-10T06:16:01.609996968Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "1.6.7",
"product": "FileZilla ftpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:filezilla-project:filezilla_server:1.6.7",
"part": "a",
"vendor": "filezilla\\-project",
"product": "filezilla_server",
"version": "1\\.6\\.7",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220-FileZilla Server 1.6.7\r\n220 Please visit https://filezilla-project.org/\r\n"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
}
},
"fingerprint_md5": "D0AE14D3676D999A70493C191F85D30A",
"fingerprint_sha1": "2B5B7A627BD7560982A3F1B414E15694C8B67433",
"fingerprint_sha256": "4C6D7D2A3028A7DC91BCD63CD119F62D6B397B28335248C8CED02EFCD4236FC5",
"issuer": {
"common_name": [
"filezilla-server self signed certificate"
]
},
"issuer_dn": "/CN=filezilla-server self signed certificate",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "-210476083454000043126916336298002622233295484794",
"signature": {
"algorithm": {
"name": "ecdsa-with-SHA256",
"oid": "1.2.840.10045.4.3.2"
},
"self_signed": true,
"value": "MzA0NTAyMjEwMGNiYmE5MTY4ZDZhYmVhZDBmNzk5MzE5YTA2ZWUzM2I5YjljNDZhYmI3NTkyMTdjYmM4NTJhYjUwY2UzMDU3NzgwMjIwN2ZjNGM2MDczZjFkOGVlMjA3MDg5MjVhODU4ZGZhMWQ0YjFiMmY0YmI5OWIxYzhmMWZmZmIzZDJmOGEwNDFlYQ=="
},
"subject": {
"common_name": [
"filezilla-server self signed certificate"
]
},
"subject_alt_name": {
"dns_names": [
"filezilla-server self signed certificate"
],
"extended_dns_names": []
},
"subject_dn": "/CN=filezilla-server self signed certificate",
"subject_key_info": {
"_key": "ecdsa",
"dh": [],
"dsa": [],
"ecdsa": {
"b": "\"Zc65d8aa:93e7b3ebbdUv9886bce1d06b0ccSb0f6;ce<>'d2`K\"",
"curve": "p256",
"gx": "k17d1f2e1,BGf8bce6e5ca4@f2w03}81-eb3a0f4a19Ed898c296",
"gy": "Oe3Be2fe1a7f9b8ee7ebJ|0f9e16+ce3Wk1^cecbb6@h7bfQf5",
"length": 256,
"p": "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
"x": "95961637597687379982452940272528726041475334893847306888547169132609398722730",
"y": "8998909714867433205191428115580129712680000141695526398850450884105404458176"
},
"fingerprint_sha256": "adbb327c81c2831237c1100d148f70d992f477561e53e58779baebd7aff47b08",
"key_algorithm": "Elliptic_curve_cryptography",
"rsa": []
},
"tbs_fingerprint": "3477af07c862e2ddad417b4d5cc090ea7e5ee8a332fe266c87820403069dd299",
"validation_level": "DV",
"validity": {
"length_seconds": 31622700,
"not_after": "2024-03-31T23:00:28",
"not_before": "2023-03-31T22:55:28"
},
"version": 2
},
"fingerprint_sha256": "4C6D7D2A3028A7DC91BCD63CD119F62D6B397B28335248C8CED02EFCD4236FC5",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-10T05:54:27.567Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "10.46--",
"product": "MailEnable smptd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mailenable:mailenable:10.46--",
"part": "a",
"vendor": "mailenable",
"product": "mailenable",
"version": "10\\.46\\-\\-",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 dedi-1079357.sarc.mx ESMTP MailEnable Service, Version: 10.46-- ready at 06/06/25 08:50:18\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "keyiddba79ef3a2bacebb3af749e5745d1d9bc30c8157\ndirname/c=ch/l=schaffhausen/o=plesk/cn=plesk/[email protected]\nserial618c5141",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"subject_key_id": "dba79ef3a2bacebb3af749e5745d1d9bc30c8157"
},
"fingerprint_md5": "3B217695A04CFA892955A2986EF8FF63",
"fingerprint_sha1": "0E22DC9875A70C7CE2CA2976D9D8C67B7767A6B4",
"fingerprint_sha256": "A04E40FB3A1EE534D2F4B01F6CB1F733864541F355F11813BC5A3844BB493A12",
"issuer": {
"common_name": [
"Plesk"
],
"country": [
"CH"
],
"email_address": [
"[email protected]"
],
"locality": [
"Schaffhausen"
],
"organization": [
"Plesk"
]
},
"issuer_dn": "/C=CH/L=Schaffhausen/O=Plesk/CN=Plesk/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "1636585793",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "MWFhNjRkYWFhOGNkY2MzODc4NjljMzJjODE4NTA4N2NmYTAxNjQ1MzRhNzUyZjYxYjZhMDA0ZDMwNjE1NmM4MGYzY2EyNTM5NjdjNTZhOGZjOTgzMGZkOTE3MjNkMjM3MzQxNGRkYTI4OWVlN2E4OWZjNzQ2MTRlZDRmNWY1YjZkOGE4ZjM4MWRkYzI3YjExODMxMmM0OWYxNmY0YTU1MDVmZjBjMjM2M2Q1ZjU1N2FlZGUzMzI4OWIxYjU0ZjYxMTMxMTExZjc3YTYyYjZhZjI4MDExYjI3OGJhMzAxMzllYWZkYTUwZTFmNjUyZTkzZjQxNDQ0M2Q0MDU3ZTkwMDYwMzViMzU5ZDA4NzNlNTc2ZmU3MTdhMWQ0OTIwODRmYTI0ZjQ5MTlkYjVkOWZjY2NiMDkwYzMyYTA5MzM2NDM1N2QwODYyNGU3ZGI4M2M3MDBiOWJhZjNiNjg1NzFiZDFmYmVhZDU5NTcyYzRiM2IyNGRmNjNkMTE2ZjFkYzYyNzliMjBkZjBmNzM3NTgxMjZmMGNlZmI2N2Q0ZDM3NWNkNmI4MjA5MjZjYmYxYTU1ZTNhMjNjMTg5MTQ1MDkwY2Q4MzJiZmY1MTc0ZDI3M2MzMzc3MzBmZWUxNmJhNmM5YjAyNWE0ZGJjN2Y2MGM5YWE0MDcwOGFjN2RmNDEyM2M="
},
"subject": {
"common_name": [
"Plesk"
],
"country": [
"CH"
],
"email_address": [
"[email protected]"
],
"locality": [
"Schaffhausen"
],
"organization": [
"Plesk"
]
},
"subject_alt_name": {
"dns_names": [
"Plesk"
],
"extended_dns_names": []
},
"subject_dn": "/C=CH/L=Schaffhausen/O=Plesk/CN=Plesk/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "b5317b8d726dacb9dbc7cd9cd1ccd784617887f55b2eba8e5c4c7e5eed247fa8",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "cbe7e6ae8ab25140ca97cd7d2bb6e67a18048f27acf2850634ec4d88ca26dc03",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2022-11-10T23:09:55",
"not_before": "2021-11-10T23:09:55"
},
"version": 2
},
"fingerprint_sha256": "A04E40FB3A1EE534D2F4B01F6CB1F733864541F355F11813BC5A3844BB493A12",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-06T13:55:45.283Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "10.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:10.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "10\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!doctype html>\r\n<html lang=\"en\">\r\n<head>\r\n <meta charset=\"utf-8\">\r\n <title>Web Server's Default Page</title>\r\n <meta name=\"copyright\" content=\"Copyright 1999-2021. Plesk International GmbH. All rights reserved.\">\r\n <script src=\"https://assets.plesk.com/static/default-website-content/public/default-server-index.js\"></script>\r\n</head>\r\n<body>\r\n You see this page because there is no Web site at this address.\r\n</body>\r\n</html>\r\n",
"body_murmur": -2102769832,
"body_sha256": "ee34d4d3df8098a47a74bfa4de1d4ce71d747b4efaddcafd6177fc91b063c7fb",
"component": [
"IIS:10.0",
"Windows Server"
],
"content_length": -1,
"headers": {
"accept_ranges": [
"bytes"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 08 Jun 2025 14:32:05 GMT"
],
"etag": [
"\"01afe389d83d71:0\""
],
"last_modified": [
"Wed, 28 Jul 2021 10:42:12 GMT"
],
"server": [
"Microsoft-IIS/10.0"
],
"vary": [
"Accept-Encoding"
],
"x_powered_by": [
"ASP.NET"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "162.215.130.50",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Web Server's Default Page"
}
},
"url": "http://162.215.130.50/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-08T14:32:07.295Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "MailEnable POP3 Server",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mailenable:mailenable",
"part": "a",
"vendor": "mailenable",
"product": "mailenable",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"pop3": {
"banner": "+OK Welcome to MailEnable POP3 Server\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-08T20:08:56.542Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "10.0",
"product": "Microsoft IIS httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:microsoft:internet_information_services:10.0",
"part": "a",
"vendor": "microsoft",
"product": "internet_information_services",
"version": "10\\.0",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html><html lang=\"en\" dir=\"ltr\" class=\"sid-plesk\" data-theme=\"default\">\r\n<head>\r\n <meta charset=\"utf-8\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\">\r\n <meta name=\"SKYPE_TOOLBAR\" content=\"SKYPE_TOOLBAR_PARSER_COMPATIBLE\">\r\n <meta name=\"format-detection\" content=\"telephone=no\">\r\n <meta name=\"forgery_protection_token\" id=\"forgery_protection_token\" content=\"ee24f8ba767e0f1081ea3d13c48c0e16\">\r\n <title>Plesk Obsidian 18.0.56</title> \r\n <link rel='icon' href='/favicon.ico?1699438805' sizes='any'>\r\n <link rel='icon' href='/images/favicon.svg?1699438798' type='image/svg+xml'>\r\n <link rel='apple-touch-icon' href='/images/apple-touch-icon.png?1699438798'>\r\n <link rel='manifest' href='/manifest.webmanifest?1699438805' /> <meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0, maximum-scale=1.0\">\r\n <meta name=\"plesk-build\" content=\"20231106.23\">\r\n <meta name=\"plesk-revision\" content=\"7f3265358b91416f035eddb5dfe564171fd100a4\">\r\n <link rel=\"stylesheet\" href=\"/ui-library/plesk-ui-library.css?1698966144\">\n<link rel=\"stylesheet\" href=\"/cp/theme/css/main.css?1699439097\">\n <link href=\"/modules/letsencrypt/global.css?1697220216\" media=\"screen\" rel=\"stylesheet\" type=\"text/css\" > <script type=\"text/javascript\" src=\"/cp/javascript/externals/prototype.js?1699439096\"></script>\r\n<script type=\"text/javascript\" src=\"/ui-library/plesk-ui-library.min.js?1698966144\"></script>\r\n<script type=\"text/javascript\" src=\"/cp/javascript/vendors.js?1699439097\"></script>\r\n<script type=\"text/javascript\" src=\"/cp/javascript/main.js?1699439097\"></script>\r\n<script type=\"text/javascript\" src=\"/cp/javascript/externals/require.js?1699439096\"></script>\r\n<script type=\"text/javascript\">\r\n //<!--\r\n require.config({\"waitSeconds\":0,\"baseUrl\":\"\\/cp\\/javascript\\/\",\"urlArgs\":\"18.0.56-4\",\"paths\":{\"modules\":\"\\/modules\"}});\r\ndefine('plesk-ui-library', window.PleskUiLibrary); //-->\r\n</script>\r\n<script type=\"text/javascript\" src=\"/modules/notifier/global.js?1701110578\"></script>\r\n<script type=\"text/javascript\" src=\"/modules/letsencrypt/global.js?1697220216\"></script>\r\n<script type=\"text/javascript\">\r\n //<!--\r\n Jsw.UAT.init({\"versionInfo\":\"18.0.56\",\"instanceId\":\"1CC9.EAE0.1F26.4786.A2FA.F16F.5EBB.FD78\",\"accountCreated\":null,\"accountLevel\":null,\"accountId\":null,\"sessionId\":null,\"firehose\":{\"stream\":\"plesk-18.0-ux\",\"noSessionStream\":\"plesk-18.0-ux-no_session\",\"region\":\"us-west-2\",\"accessKeyId\":\"AKIAR4YEYRJLZOCG766Q\",\"secretAccessKey\":\"y+7bE9B322e5STEmK9dAwJVf\\/N9maN4eQ5h1DT9d\",\"endpoint\":\"firehose.us-west-2.amazonaws.com\",\"httpOptions\":{\"connectTimeout\":5000,\"timeout\":5000}}}); //-->\r\n</script> <script type=\"text/javascript\">\r\n//<![CDATA[\r\n Jsw.skinUrl = '/cp/theme/';\r\n//]]>\r\n</script>\r\n\r\n \r\n </head>\r\n<body>\r\n<div id=\"plesk-root\"></div>\r\n<script>\r\n//<![CDATA[\r\n Plesk.run({\"config\":{\"feedback\":{\"sentry\":{\"release\":\"18.0.56.4\",\"environment\":\"production\",\"tags\":{\"locale\":\"en-US\",\"hwid\":\"1CC9.EAE0.1F26.4786.A2FA.F16F.5EBB.FD78\",\"revision\":\"7f3265358b91416f035eddb5dfe564171fd100a4\",\"updateTicket\":\"c511437f-3c89-4451-823e-bf8254c70644\"},\"user\":{\"id\":\"1CC9.EAE0.1F26.4786.A2FA.F16F.5EBB.FD78-1024-0\"},\"dsn\":\"https:\\/\\/[email protected]\\/1327420\",\"sampleRate\":0.05}}},\"data\":{\"status\":[],\"isInitial\":true,\"values\":{\"login_name\":\"\",\"locale_id\":\"default\"}},\"graphqlQueries\":[{\"query\":\"query LoginPage { viewer { login resolvableHostname mobileApplicationPromotion { name icon url } } config { gdpr { cookieSettings { loginFormEntrypointEnabled } } login { howToLoginArticle } } locales { code name isRtl } serverInfo { cloudType isFirstLogin } loginContentInclude { headContent bodyContent } } \",\"variables\":null,\"data\":{\"viewer\":{\"login\":null,\"resolvableHostname\":\"https:\\/\\/dedi-1079357.sarc.mx\\/login_up.php\",\"mobileApplicationPromotion\":null,\"__typename\":\"User\"},\"config\":{\"gdpr\":{\"cookieSettings\":{\"loginFormEntrypointEnabled\":true,\"__typename\":\"ConfigSectionGdprCookieSettings\"},\"__typename\":\"ConfigSectionGdpr\"},\"login\":{\"howToLoginArticle\":\"https:\\/\\/support.plesk.com\\/hc\\/en-us\\/articles\\/12377667582743-How-to-log-in-to-Plesk-\",\"__typename\":\"ConfigSectionLogin\"},\"__typename\":\"Config\"},\"locales\":[{\"code\":\"en-US\",\"name\":\"English (United States)\",\"isRtl\":false,\"__typename\":\"Locale\"}],\"serverInfo\":{\"cloudType\":\"\",\"isFirstLogin\":false,\"__typename\":\"ServerInfo\"},\"loginContentInclude\":{\"headContent\":\"\",\"bodyContent\":\"\",\"__typename\":\"LoginContentInclude\"},\"__typename\":\"Query\"}},{\"query\":\"query Branding { viewer { login customTitle logo { image imageAlt url edition } } } \",\"variables\":null,\"data\":{\"viewer\":{\"login\":null,\"customTitle\":\"Plesk Obsidian 18.0.56\",\"logo\":{\"image\":\"\\/cp\\/theme\\/images\\/logos\\/plesk\\/logo.svg\",\"imageAlt\":\"Plesk Obsidian 18.0.56\",\"url\":null,\"edition\":\"web host edition\",\"__typename\":\"UserLogo\"},\"__typename\":\"User\"},\"__typename\":\"Query\"}},{\"query\":\"query CookiePolicy { config { gdpr { cookieBox { enabled } cookies(type: [\\\"analytics\\\", \\\"marketing\\\"]) { name type } } } } \",\"variables\":null,\"data\":{\"config\":{\"gdpr\":{\"cookieBox\":{\"enabled\":true,\"__typename\":\"ConfigSectionGdprCookieBox\"},\"cookies\":[{\"name\":\"uat-aid\",\"type\":\"analytics\",\"__typename\":\"ConfigSectionGdprCookie\"},{\"name\":\"uat-iid\",\"type\":\"analytics\",\"__typename\":\"ConfigSectionGdprCookie\"},{\"name\":\"uat-sid\",\"type\":\"analytics\",\"__typename\":\"ConfigSectionGdprCookie\"},{\"name\":\"uat-data-source\",\"type\":\"analytics\",\"__typename\":\"ConfigSectionGdprCookie\"}],\"__typename\":\"ConfigSectionGdpr\"},\"__typename\":\"Config\"},\"__typename\":\"Query\"}},{\"query\":\"query TaskProgressBar { viewer { login type } config { webSocket { enabled } } } \",\"variables\":null,\"data\":{\"viewer\":{\"login\":null,\"type\":\"UNDEFINED\",\"__typename\":\"User\"},\"config\":{\"webSocket\":{\"enabled\":true,\"__typename\":\"ConfigSectionWebSocket\"},\"__typename\":\"Config\"},\"__typename\":\"Query\"}}],\"localeSections\":{\"components.buttons\":{\"save\":\"OK\",\"apply\":\"Apply\",\"cancel\":\"Cancel\",\"yes\":\"Yes\",\"yesRemove\":\"Yes, remove\",\"no\":\"No\",\"ok\":\"OK\",\"remove\":\"Remove\",\"logout\":\"Log out\",\"next\":\"Next >\",\"start\":\"Start >>\",\"wait\":\"Please wait\",\"updateAndLock\":\"Update & Lock\",\"applyAndLock\":\"Apply & Lock\",\"updateAndSync\":\"Update & Sync\",\"badgeNew\":\"New\",\"timeout\":\"This operation is taking too long. Check the results in a few minutes.\",\"resetToDefault\":\"Reset To Default\",\"defaultValue\":\"(Default)\",\"nextWithoutArrow\":\"Next\",\"back\":\"Back\",\"createWebspace\":\"Create Webspace\",\"upgrade\":\"Upgrade\"},\"components.password.meter\":{\"title\":\"Password Strength\",\"description\":\"To improve your password:\",\"yourPasswordIsStrong\":\"Your password is strong, but you can make it even stronger by increasing its length.\",\"verdictVeryWeak\":\"Very weak\",\"verdictWeak\":\"Weak\",\"verdictMedium\":\"Medium\",\"verdictStrong\":\"Strong\",\"verdictVeryStrong\":\"Very strong\"},\"components.tasks.common\":{\"hideCompletedTasks\":\"Hide Completed\",\"progressBarHide\":\"Hide\",\"progressBarShow\":\"Show\",\"close\":\"Close\",\"refresh\":\"Refresh Page\",\"taskInProgress\":\"%%count%% tasks in progress...\",\"percentCompleted\":\"%%percent%%% completed\",\"allTasksCompleted\":\"All %%num%% tasks were successfully completed.\",\"minimize\":\"Minimize\",\"statusDone\":\"Done\",\"statusError\":\"Failed\",\"statusNotStarted\":\"Queued\",\"statusCanceled\":\"Canceled\",\"progressDialogLink\":\"detailed progress\"},\"components.status\":{\"error\":\"Error\",\"info\":\"Information\",\"warning\":\"Warning\"},\"components.routes\":{\"home.title\":\"Home\",\"server.title\":\"Tools & Settings\",\"server\\/about.title\":\"About Plesk\",\"server\\/action-log.title\":\"Action Log Settings\",\"server\\/settings.title\":\"Server Settings\"},\"components.cookie-policy.info\":{\"title\":\"Tell us whether you accept cookies\",\"necessaryCookiesMessage\":\"By logging in to Plesk, you allow us to use necessary сookies.\",\"message\":\"%%cookieInformationLink%% about how you use Plesk. It helps us to improve our services so that you could make the most out of Plesk.\",\"cookieInformationLink\":\"Cookies collect information\",\"acceptButton\":\"Accept all cookies\",\"acceptNecessaryCookiesButton\":\"Accept necessary cookies\",\"preferencesButton\":\"Set cookie preferences\"},\"components.cookie-policy.preferences\":{\"title\":\"Cookies in Plesk\",\"description\":\"Cookies are files saved on your phone, tablet, or computer when you visit Plesk. We use cookies to make Plesk work, to have it operate smoothly, and to collect certain information.\",\"settingsTitle\":\"Cookie settings\",\"settingsDescription\":\"We use 3 types of cookies. Enable those you allow us to use.\",\"analyticsTitle\":\"Cookies that help us to improve the product\",\"analyticsDescription\":\"We use anonymous tracking cookies to collect information on how you use Plesk. It helps us make Plesk better. Tracking cookies do not identify anyone. They store anonymized information about Plesk pages you visited, time your spent on them, and page objects you clicked on. We do not share the collected data with third-party services.\",\"marketingTitle\":\"Cookies that help with our communications and marketing\",\"marketingDescription\":\"These cookies collect information about your Plesk preferences and help us provide you with personal recommendations.\",\"necessaryTitle\":\"Strictly necessary cookies\",\"necessaryDescription\":\"These cookies enable Plesk core functions such as security, network management, and accessibility. These cookies always need to be on. Necessary cookies also include functional cookies that are in charge of personalization and usability improvements (for example, language settings, font size, and prefilled forms). You may disable necessary cookies in your %%browserSettingsLink%% but this may affect Plesk.\",\"browserSettingsLink\":\"browser settings\",\"pleskCookiesLink\":\"See the detailed description of the used cookies\",\"on\":\"On\",\"off\":\"Off\",\"submitButton\":\"Save changes\",\"cancelButton\":\"Cancel\"},\"components.license-status\":{\"trialLicenseWarningAdmin\":\"days remaining for trial version\",\"buyLicenseButton\":\"Buy a License\",\"installLicenseButton\":\"Already have a license?\",\"testLicenseWarningAdmin\":\"Your Plesk is operating with a license that is not intended for production use.\",\"testLicenseWarningClient\":\"This installation of Plesk is operating with a license that is not intended for production use. Contact your server administrator to resolve this issue.\",\"trialOverTitle\":\"Your trial is almost over\",\"trialOverText\":\"Your trial period will end soon. To continue using Plesk once your trial is over, buy a license.\",\"defaultLicenseWarningAdmin\":\"In order to use Plesk, obtain and install a new trial key.\",\"expiredLicenseWarningAdmin\":\"Your license key has expired. In order to use Plesk, obtain and install a new valid license key.\",\"demoLicenseWarningAdmin\":\"Enjoyed the demo?\",\"demoLicenseTryPlesk\":\"Learn how to %%link%%.\",\"demoLicenseTryPleskLink\":\"try Plesk on your own or cloud server\",\"getTrialButton\":\"Get Trial\"},\"components.search-bar\":{\"nothingFound\":\"No results found.\",\"fieldStub\":\"Search...\",\"fieldStubHint\":\"Search for domains, extensions, and more…\",\"moreResultsFound\":\"More than %%limit%% results were found. Please refine your search.\",\"recentSearch\":\"Recent search results:\",\"recentSearchHint\":\"The latest search results will be shown here. Come back for quick access to the pages you looked for.\",\"removeFromRecent\":\"Remove from recent results\"},\"components.shortcuts\":{\"logIn\":\"Log in\",\"identityName\":\"Subscriber %%identity%%\",\"loggedInAs\":\"Logged in as\",\"impersonatedInAs\":\"Subscriber\",\"myProfile\":\"Edit Profile\",\"logOut\":\"Log out\",\"backToAdmin\":\"Back to Administrator\",\"readManual\":\"Read the Guide\",\"sureToLogout\":\"Are you sure you want to log out?\",\"impersonatedName\":\"logged in as %%identity%%\",\"userFeedback\":\"Suggest an Idea\",\"facebookJoinCommunity\":\"Join Us on Facebook\",\"twitterFollow\":\"Follow @Plesk\",\"provideRating\":\"Share an Opinion\",\"linkToCookies\":\"Cookies\",\"darkThemeOn\":\"Switch to dark theme\",\"darkThemeOff\":\"Switch to light theme\"},\"components.subscription-switcher\":{\"subscription\":\"Subscription\",\"allSubscriptions\":\"All subscriptions\",\"allSubscriptionsLimitOverusedDescription\":\"The option to display all subscriptions is unavailable because the number of subscriptions on your account (%%value%%) is greater than %%limit%%.\"},\"components.notification-center\":{\"title\":\"Notifications\",\"markAsRead\":\"Mark as read\",\"markAsUnread\":\"Mark as unread\",\"markAllAsRead\":\"Mark all as read\",\"settings\":\"Settings\",\"filterButton\":\"Filter\",\"filterUnread\":\"Unread\",\"filterCritical\":\"Critical\",\"filterFavorite\":\"Favorites\",\"filterReset\":\"Clear filter\",\"searchPlaceholder\":\"Find...\",\"favoriteNotification\":\"Add to favorites\",\"unfavoriteNotification\":\"Remove from favorites\",\"deleteNotification\":\"Delete the notification\",\"learnMore\":\"Learn more\",\"moreToasts\":\"You have %%total%% more new notifications\",\"dateFormat\":\"%%month%% %%day%%\",\"timeFormat\":\"%%hours%%:%%minutes%%\",\"month0\":\"Jan\",\"month1\":\"Feb\",\"month2\":\"Mar\",\"month3\":\"Apr\",\"month4\":\"May\",\"month5\":\"Jun\",\"month6\":\"Jul\",\"month7\":\"Aug\",\"month8\":\"Sep\",\"month9\":\"Oct\",\"month10\":\"Nov\",\"month11\":\"Dec\",\"categoryAlert\":\"Alert\",\"categoryWarning\":\"Warning\",\"listEmptyTitle\":\"Keep up to date with the most important server events\",\"listEmptyDescription\":\"We will send you notifications when the resource usage threshold is exceeded, critical updates are delivered, etc. Stay tuned!\",\"listFilteredTitle\":\"No item fits the filtering conditions\",\"listFilteredDescription\":\"Looks like the filter is too strict. Try to change the filtering criteria.\"},\"components.view-switcher\":{\"title\":\"Change View\",\"serviceProviderView\":\"Service Provider view\",\"serviceProviderViewHint\":\"for web hosting providers\",\"serviceProviderViewRecommended\":\"recommended for web hosting providers\",\"powerUserView\":\"Power User view\",\"powerUserViewHint\":\"for developers and web agencies\",\"powerUserViewRecommended\":\"recommended for developers and web agencies\",\"currentViewMessage\":\"You are currently in %%view%% (%%hint%%).\",\"actionMessage\":\"%%switchLink%% (%%recommended%%) or %%helpLink%%.\",\"switchView\":\"Switch to %%view%%\",\"learnMore\":\"learn more about views\",\"powerUserViewWarning\":\"If customers were added in Service Provider View, their domains aren't shown in Power User View. Only admin's domains are available in this view.\",\"confirmationBoxText\":\"Do you want to hide the Change View menu?\",\"confirmationBoxDescription\":\"Note that hiding the menu will remove it permanently. You will still be able to switch between views in Tools & Settings > Interface Management.\",\"confirmationBoxButtonYes\":\"Yes\",\"confirmationBoxButtonNo\":\"No\"},\"components.pages.home\":{\"title\":\"Home\"},\"controllers.error.error\":{\"title\":\"Server Error\",\"repairKitDescription\":\"You may be able to resolve the issue automatically using Repair Kit.\",\"repairKitAdminDescription\":\"If you are the server administrator, try resolving the issue using our troubleshooting tool, Repair Kit.\",\"repairKitOpen\":\"Open Repair Kit\",\"repairKitOpenNote\":\"You will be asked to enter the Plesk administrator password.\",\"repairKitUnavailable\":\"Repair Kit is unavailable. To restore it, log in to the server via SSH, run the command 'systemctl restart plesk - repaird', and then refresh this page.\",\"reportErrorMessage\":\"Need help resolving the issue?\",\"visitHelpCenter\":\"Visit Plesk Help Center.\",\"networkError\":\"Network error\",\"networkErrorDescription\":\"Your connection is unstable.\",\"helpActions\":\"That's what you can do\",\"reloadPage\":\"Reload Page\",\"backToPreviousPage\":\"Back to Previous Page\",\"homePage\":\"Home Page\",\"searchKbArticle\":\"Search for related Knowledge Base articles\",\"invalidUrl\":\"An invalid URL was requested.\",\"reportProblem\":\"Report a problem\",\"documentation\":\"Documentation\",\"knowledgeBase\":\"Knowledge base\",\"forum\":\"Forum\",\"youTube\":\"YouTube\",\"facebook\":\"Facebook\"},\"components.forms.login\":{\"loginLabel\":\"Username\",\"passwdLabel\":\"Password\",\"localeLabel\":\"Interface language\",\"defaultLocale\":\"Default\",\"loginButtonLabel\":\"Log in\",\"enterUsername\":\"Enter your username.\",\"enterPassword\":\"Enter your password.\",\"whatUsernamePassword\":\"What username and password to use?\",\"forgotPasswordLabel\":\"Forgot your password?\",\"cookies\":\"Cookies policy in Plesk\",\"avoidSSLWarningsMsg\":\"To avoid SSL warnings during Plesk login, use %%link%%\",\"digitalOceanMsg\":\"New to Plesk on DigitalOcean? Use \\\"root\\\" and the password entered when creating this droplet to log in. %%link%%\",\"amazonLightsailMsg\":\"New to Plesk on Lightsail? To log in to Plesk, access the server via SSH and use the \\\"plesk login\\\" command. %%link%%\",\"readGuide\":\"Read the complete guide.\",\"mobileApplicationMessage\":\"For a better experience, we recommend that you install the %%name%% application.\",\"mobileApplicationInstall\":\"Install Now\",\"mobileApplicationHide\":\"No, thanks\"},\"components.forms.get-password\":{\"label\":\"Reset password\",\"text\":\"Enter your email address, or username registered in Plesk and we will send you a password reset email.\",\"emailLabel\":\"Email address\",\"loginLabel\":\"Username\",\"send\":\"Send\",\"cancel\":\"Cancel\",\"errorInvalidEmail\":\"The email address was not recognized. Please double-check and try again.\",\"messageSend\":\"The password reset email was sent to the associated email address.\\nIf the email does not arrive, please contact your Plesk administrator.\"},\"components.forms.restore-password\":{\"title\":\"Change Your Password\",\"passwordLabel\":\"New password\",\"buttonRestore\":\"Save\",\"buttonCancel\":\"Cancel\",\"isEmpty\":\"The required field is empty. You need to specify a value.\",\"errorInvalidSecret\":\"Invalid secret code\",\"errorNotFoundSecret\":\"Please request a new secret code\",\"restoreSuccess\":\"Your password was updated. Use the new password to log in to Plesk or to your email address.\"}}});\r\n//]]>\r\n</script> </body>\r\n</html>\r\n",
"body_murmur": -1777958547,
"body_sha256": "162b9d5d24176a864677bad865d5a134d433953af7eb5b533352518aaf03c54d",
"component": [
"IIS:10.0",
"Windows Server"
],
"content_length": -1,
"favicon": {
"md5_hash": "650b28c6cf1b473aed15ba26bad1da92",
"murmur_hash": -614457039,
"path": "https://162.215.130.50:443/favicon.ico?1699438805",
"size": 4286
},
"headers": {
"cache_control": [
"no-store, no-cache, must-revalidate,post-check=0, pre-check=0"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Sun, 08 Jun 2025 01:14:45 GMT"
],
"expires": [
"Fri, 28 May 1999 00:00:00 GMT"
],
"last_modified": [
"Sun, 08 Jun 2025 01:14:45 GMT"
],
"p3p": [
"CP=\"NON COR CURa ADMa OUR NOR UNI COM NAV STA\""
],
"pragma": [
"no-cache"
],
"server": [
"Microsoft-IIS/10.0"
],
"vary": [
"Accept-Encoding"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_powered_by": [
"ASP.NET",
"ARR/3.0",
"ASP.NET"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"cache_control": [
"no-store, no-cache, must-revalidate,post-check=0, pre-check=0"
],
"content_length": [
"0"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Sun, 08 Jun 2025 01:14:45 GMT"
],
"expires": [
"Fri, 28 May 1999 00:00:00 GMT"
],
"last_modified": [
"Sun, 08 Jun 2025 01:14:45 GMT"
],
"location": [
"https://162.215.130.50/login.php"
],
"p3p": [
"CP=\"NON COR CURa ADMa OUR NOR UNI COM NAV STA\""
],
"pragma": [
"no-cache"
],
"server": [
"Microsoft-IIS/10.0"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_powered_by": [
"ASP.NET",
"ARR/3.0",
"ASP.NET"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "https://162.215.130.50/login.php",
"protocol": "HTTP/1.1",
"status_code": 303,
"status_line": "303 See Other"
},
{
"headers": {
"cache_control": [
"no-store, no-cache, must-revalidate,post-check=0, pre-check=0"
],
"content_length": [
"0"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Sun, 08 Jun 2025 01:14:45 GMT"
],
"expires": [
"Fri, 28 May 1999 00:00:00 GMT"
],
"last_modified": [
"Sun, 08 Jun 2025 01:14:45 GMT"
],
"location": [
"https://162.215.130.50/login_up.php"
],
"p3p": [
"CP=\"NON COR CURa ADMa OUR NOR UNI COM NAV STA\""
],
"pragma": [
"no-cache"
],
"server": [
"Microsoft-IIS/10.0"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_powered_by": [
"ASP.NET",
"ARR/3.0",
"ASP.NET"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "https://162.215.130.50/login_up.php",
"protocol": "HTTP/1.1",
"status_code": 303,
"status_line": "303 See Other"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://162.215.130.50/login.php"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "162.215.130.50",
"path": "/login_up.php",
"scheme": "https"
}
},
"status_code": 200,
"title": "Plesk Obsidian 18.0.56",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://r3.i.lencr.org/"
],
"ocsp_urls": [
"http://r3.o.lencr.org"
]
},
"authority_key_id": "142eb317b75856cbae500940e61faf9d8b14c2c6",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 3B:53:77:75:3E:2D:B9:80:4E:8B:30:5B:06:FE:40:3B:\n 67:D8:4F:C3:F4:C7:BD:00:0D:2D:72:6F:E1:FA:D4:17\n Timestamp : Oct 28 01:49:23.807 2023 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:46:02:21:00:F2:89:72:03:ED:0B:DA:AA:E8:28:77:\n B9:8A:DE:0B:65:FF:93:CA:31:2D:56:73:E6:97:16:1D:\n B9:80:40:FC:BA:02:21:00:95:0F:4D:09:16:F3:09:59:\n 53:7F:AA:44:E6:BF:13:07:5C:27:1B:D4:5E:53:7D:B1:\n 0F:A8:E5:EF:AE:10:1A:69\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2:\n 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B\n Timestamp : Oct 28 01:49:23.851 2023 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:44:02:20:4F:D0:D3:4B:A1:B5:2E:46:D8:3D:83:51:\n 1A:C2:0C:25:3D:70:FA:AC:05:C3:C6:BE:44:66:EF:6A:\n D0:CC:B4:1B:02:20:34:F5:0C:3F:EE:12:20:88:CC:8A:\n E2:B6:E6:DA:31:52:62:16:06:D5:B0:C8:30:B7:D2:6B:\n B6:A6:3E:5F:79:87",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"dedi-1079357.sarc.mx"
]
},
"subject_key_id": "7e929d3f731aa5aab149270b5465fe63e5d53523"
},
"fingerprint_md5": "83F9B6611F0B5536F45A73A7987B53EE",
"fingerprint_sha1": "BE679D4B3A5C8796E5D667C017E88964FA4A9C4E",
"fingerprint_sha256": "F5617EA4CC3D1D37AA85791DCD730D98522395140E40C31F09C5BED9A49426B2",
"issuer": {
"common_name": [
"R3"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=R3",
"jarm": "2ad2ad00000000022c2ad2ad2ad2ad89cb1e4a786a3a377716a803180489d2",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "388605597323789334357104142029595002378337",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "3b5377753e2db9804e8b305b06fe403b67d84fc3f4c7bd000d2d726fe1fad417",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3046022100f2897203ed0bdaaae82877b98ade0b65ff93ca312d5673e697161db98040fcba022100950f4d0916f30959537faa44e6bf13075c271bd45e537db10fa8e5efae101a69"
},
"timestamp": "2023-10-28T01:49:23.807000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "eecdd064d5db1acec55cb79db4cd13a23287467cbcecdec351485946711fb59b",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304402204fd0d34ba1b52e46d83d83511ac20c253d70faac05c3c6be4466ef6ad0ccb41b022034f50c3fee122088cc8ae2b6e6da3152621606d5b0c830b7d26bb6a63e5f7987"
},
"timestamp": "2023-10-28T01:49:23.851000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"dedi-1079357.sarc.mx"
]
},
"subject_alt_name": {
"dns_names": [
"dedi-1079357.sarc.mx"
],
"extended_dns_names": [
{
"domain": "sarc",
"fld": "sarc.mx",
"subdomain": "dedi-1079357",
"tld": "mx"
}
]
},
"subject_dn": "/CN=dedi-1079357.sarc.mx",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "5c3298060ab85599e58c3e9b40655654c513f0468fc40a959a9af631967a74ce",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "59a7152ad5191eafc54332c4903ac24ad3bd213f44ef8b5439c7be4c4ffdc932",
"tbs_noct_fingerprint": "c53bb6f2913d20f2818ef6fecad517ab0c1c4a732d8f39ef16bc95211b2fd1ba",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2024-01-26T00:49:22",
"not_before": "2023-10-28T00:49:23"
},
"version": 2
},
"fingerprint_sha256": "F5617EA4CC3D1D37AA85791DCD730D98522395140E40C31F09C5BED9A49426B2",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://162.215.130.50/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-08T01:14:50.203Z"
},
{
"port": 445,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"smb": {
"capabilities": {
"dfs_support": true,
"leasing_support": true,
"multicredit_support": true
},
"has_ntlm": true,
"negotiation": {
"authentication_types": [
"1.3.6.1.4.1.311.2.2.30",
"1.3.6.1.4.1.311.2.2.10"
],
"capabilities": 7,
"credits": 1,
"dialect_revision": 528,
"flags": 1,
"protocol_id": "AAAAAP5TTUI=",
"security_mode": 1,
"server_guid": "AAAAAAAAAAAAAAAAAAAAADLHNWjRFWtKrffh5CpeaGQ=",
"server_start_time": "2009-04-22T19:24:48Z",
"system_time": "2025-06-08T05:41:39Z"
},
"smbv1_support": false,
"version": "2.1.0"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-08T05:41:40.224Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "smtp",
"version": "10.46--",
"product": "MailEnable smptd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:mailenable:mailenable:10.46--",
"part": "a",
"vendor": "mailenable",
"product": "mailenable",
"version": "10\\.46\\-\\-",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-09T09:20:58.906Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.5.5-10.5.20",
"product": "MariaDB",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mariadb:mariadb:5.5.5-10.5.20",
"part": "a",
"vendor": "mariadb",
"product": "mariadb",
"version": "5\\.5\\.5\\-10\\.5\\.20",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.5.5-10.5.20-MariaDB"
}
},
"cve": [
{
"id": "CVE-2005-0004",
"score": 4.6,
"severity": "medium"
},
{
"id": "CVE-2012-0540",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2012-0572",
"score": 4,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-09T11:28:42.084Z"
},
{
"port": 6443,
"protocol": "tcp",
"name": "unknown",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-06-08T09:34:26.737Z"
}
],
"services_hash": "e2bdebbb96cbc0d1e770c27f753aaaebdd83a04f9d6bcac86c70728d5d703317",
"last_updated_at": "2025-06-10T05:54:27.567Z",
"banner": [
"mysql",
"http",
"pop3",
"tls",
"ftp",
"smtp",
"smb"
],
"is_vuln": true,
"cveDetails": {
"CVE-2005-0004": {
"id": "CVE-2005-0004",
"references": [
"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
"http://lists.mysql.com/internals/20600",
"http://marc.info/?l=bugtraq&m=110608297217224&w=2",
"http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
"http://secunia.com/advisories/13867",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
"http://www.debian.org/security/2005/dsa-647",
"http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
"http://www.securityfocus.com/bid/12277",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/18922",
"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
"http://lists.mysql.com/internals/20600",
"http://marc.info/?l=bugtraq&m=110608297217224&w=2",
"http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
"http://secunia.com/advisories/13867",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
"http://www.debian.org/security/2005/dsa-647",
"http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
"http://www.securityfocus.com/bid/12277",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/18922"
],
"score": 4.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-59"
},
"CVE-2012-0540": {
"id": "CVE-2012-0540",
"references": [
"http://osvdb.org/83976",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54551",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77061",
"http://osvdb.org/83976",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54551",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77061"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0572": {
"id": "CVE-2012-0572",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0574": {
"id": "CVE-2012-0574",
"references": [
"http://marc.info/?l=bugtraq&m=135109152819176&w=2",
"http://marc.info/?l=bugtraq&m=135109152819176&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266",
"http://marc.info/?l=bugtraq&m=135109152819176&w=2",
"http://marc.info/?l=bugtraq&m=135109152819176&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0578": {
"id": "CVE-2012-0578",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1688": {
"id": "CVE-2012-1688",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53067",
"http://www.securitytracker.com/id?1026934",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53067",
"http://www.securitytracker.com/id?1026934"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1689": {
"id": "CVE-2012-1689",
"references": [
"http://osvdb.org/83980",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54547",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77065",
"http://osvdb.org/83980",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54547",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77065"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1690": {
"id": "CVE-2012-1690",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53074",
"http://www.securitytracker.com/id?1026934",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53074",
"http://www.securitytracker.com/id?1026934"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1703.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1697": {
"id": "CVE-2012-1697",
"references": [
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53064",
"http://www.securitytracker.com/id?1026934",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53064",
"http://www.securitytracker.com/id?1026934"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1702": {
"id": "CVE-2012-1702",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1703": {
"id": "CVE-2012-1703",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53058",
"http://www.securitytracker.com/id?1026934",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53058",
"http://www.securitytracker.com/id?1026934"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1690.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1705": {
"id": "CVE-2012-1705",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1734": {
"id": "CVE-2012-1734",
"references": [
"http://osvdb.org/83979",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54540",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77064",
"http://osvdb.org/83979",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54540",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77064"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1735": {
"id": "CVE-2012-1735",
"references": [
"http://osvdb.org/83975",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54549",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77060",
"http://osvdb.org/83975",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54549",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77060"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1756": {
"id": "CVE-2012-1756",
"references": [
"http://osvdb.org/83978",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54524",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77063",
"http://osvdb.org/83978",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54524",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77063"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1757": {
"id": "CVE-2012-1757",
"references": [
"http://osvdb.org/83977",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54526",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77062",
"http://osvdb.org/83977",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54526",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77062"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-2750": {
"id": "CVE-2012-2750",
"references": [
"http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.securityfocus.com/bid/63125",
"http://www.securitytracker.com/id/1029184",
"https://bugzilla.redhat.com/show_bug.cgi?id=833742",
"http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.securityfocus.com/bid/63125",
"http://www.securitytracker.com/id/1029184",
"https://bugzilla.redhat.com/show_bug.cgi?id=833742"
],
"score": 10,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a \"Security Fix\", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3150": {
"id": "CVE-2012-3150",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79388",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79388"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3158": {
"id": "CVE-2012-3158",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79382",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79382"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3160": {
"id": "CVE-2012-3160",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79394",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79394"
],
"score": 2.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3163": {
"id": "CVE-2012-3163",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/56509",
"http://secunia.com/advisories/56513",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79381",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/56509",
"http://secunia.com/advisories/56513",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79381"
],
"score": 9,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3166": {
"id": "CVE-2012-3166",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3167": {
"id": "CVE-2012-3167",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79392",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79392"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3173": {
"id": "CVE-2012-3173",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79386",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79386"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3177": {
"id": "CVE-2012-3177",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79383",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79383"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3180": {
"id": "CVE-2012-3180",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79389",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79389"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3197": {
"id": "CVE-2012-3197",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79393",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79393"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5060": {
"id": "CVE-2012-5060",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5096": {
"id": "CVE-2012-5096",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5612": {
"id": "CVE-2012-5612",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
"http://seclists.org/fulldisclosure/2012/Dec/5",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.exploit-db.com/exploits/23076",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://mariadb.atlassian.net/browse/MDEV-3908",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960",
"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
"http://seclists.org/fulldisclosure/2012/Dec/5",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.exploit-db.com/exploits/23076",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://mariadb.atlassian.net/browse/MDEV-3908",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "CWE-787"
},
"CVE-2012-5614": {
"id": "CVE-2012-5614",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://seclists.org/fulldisclosure/2012/Dec/7",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.securitytracker.com/id?1027829",
"https://bugzilla.redhat.com/show_bug.cgi?id=882607",
"https://mariadb.atlassian.net/browse/MDEV-3910",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://seclists.org/fulldisclosure/2012/Dec/7",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.securitytracker.com/id?1027829",
"https://bugzilla.redhat.com/show_bug.cgi?id=882607",
"https://mariadb.atlassian.net/browse/MDEV-3910"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5627": {
"id": "CVE-2012-5627",
"references": [
"http://seclists.org/fulldisclosure/2012/Dec/58",
"http://seclists.org/fulldisclosure/2012/Dec/83",
"http://seclists.org/oss-sec/2012/q4/424",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"https://bugzilla.redhat.com/show_bug.cgi?id=883719",
"https://mariadb.atlassian.net/browse/MDEV-3915",
"http://seclists.org/fulldisclosure/2012/Dec/58",
"http://seclists.org/fulldisclosure/2012/Dec/83",
"http://seclists.org/oss-sec/2012/q4/424",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"https://bugzilla.redhat.com/show_bug.cgi?id=883719",
"https://mariadb.atlassian.net/browse/MDEV-3915"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"weakness": "CWE-522"
},
"CVE-2013-0367": {
"id": "CVE-2013-0367",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0368": {
"id": "CVE-2013-0368",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0371": {
"id": "CVE-2013-0371",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0383": {
"id": "CVE-2013-0383",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0384": {
"id": "CVE-2013-0384",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0385": {
"id": "CVE-2013-0385",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267"
],
"score": 6.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0386": {
"id": "CVE-2013-0386",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0389": {
"id": "CVE-2013-0389",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1502": {
"id": "CVE-2013-1502",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 1.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:L/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1506": {
"id": "CVE-2013-1506",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1511": {
"id": "CVE-2013-1511",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1512": {
"id": "CVE-2013-1512",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1521": {
"id": "CVE-2013-1521",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1523": {
"id": "CVE-2013-1523",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1526": {
"id": "CVE-2013-1526",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1531": {
"id": "CVE-2013-1531",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1532": {
"id": "CVE-2013-1532",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1544": {
"id": "CVE-2013-1544",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1548": {
"id": "CVE-2013-1548",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.63 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Types.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1552": {
"id": "CVE-2013-1552",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1555": {
"id": "CVE-2013-1555",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1861": {
"id": "CVE-2013-1861",
"references": [
"http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://seclists.org/oss-sec/2013/q1/671",
"http://secunia.com/advisories/52639",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.osvdb.org/91415",
"http://www.securityfocus.com/bid/58511",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://bugzilla.redhat.com/show_bug.cgi?id=919247",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
"https://mariadb.atlassian.net/browse/MDEV-4252",
"http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://seclists.org/oss-sec/2013/q1/671",
"http://secunia.com/advisories/52639",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.osvdb.org/91415",
"http://www.securityfocus.com/bid/58511",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://bugzilla.redhat.com/show_bug.cgi?id=919247",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
"https://mariadb.atlassian.net/browse/MDEV-4252"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-119"
},
"CVE-2013-2375": {
"id": "CVE-2013-2375",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2376": {
"id": "CVE-2013-2376",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2378": {
"id": "CVE-2013-2378",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2389": {
"id": "CVE-2013-2389",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2391": {
"id": "CVE-2013-2391",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.",
"vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2392": {
"id": "CVE-2013-2392",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3783": {
"id": "CVE-2013-3783",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95332",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61210",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85719",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95332",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61210",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85719"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3793": {
"id": "CVE-2013-3793",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95323",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61264",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85710",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95323",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61264",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85710"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3794": {
"id": "CVE-2013-3794",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95333",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61222",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95333",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61222"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3801": {
"id": "CVE-2013-3801",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95331",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61269",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95331",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61269"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3802": {
"id": "CVE-2013-3802",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95325",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61244",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85712",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95325",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61244",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85712"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3804": {
"id": "CVE-2013-3804",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95328",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85715",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95328",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85715"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3805": {
"id": "CVE-2013-3805",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95327",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95327",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3808": {
"id": "CVE-2013-3808",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95330",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85717",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95330",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85717"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3809": {
"id": "CVE-2013-3809",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95322",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85709",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95322",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85709"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3812": {
"id": "CVE-2013-3812",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95336",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85723",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95336",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85723"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3839": {
"id": "CVE-2013-3839",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/55291",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63109",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/55291",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63109",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-5807": {
"id": "CVE-2013-5807",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63105",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63105",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.x through 5.5.32 and 5.6.x through 5.6.12 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-5891": {
"id": "CVE-2013-5891",
"references": [
"http://osvdb.org/102070",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64891",
"http://osvdb.org/102070",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64891"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-5908": {
"id": "CVE-2013-5908",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://osvdb.org/102078",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64896",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90389",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://osvdb.org/102078",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64896",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90389"
],
"score": 2.6,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0001": {
"id": "CVE-2014-0001",
"references": [
"http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
"http://osvdb.org/102713",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/52161",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
"http://www.osvdb.org/102714",
"http://www.securityfocus.com/bid/65298",
"http://www.securitytracker.com/id/1029708",
"https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
"https://mariadb.com/kb/en/mariadb-5535-changelog/",
"http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
"http://osvdb.org/102713",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/52161",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
"http://www.osvdb.org/102714",
"http://www.securityfocus.com/bid/65298",
"http://www.securitytracker.com/id/1029708",
"https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
"https://mariadb.com/kb/en/mariadb-5535-changelog/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-119"
},
"CVE-2014-0384": {
"id": "CVE-2014-0384",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0386": {
"id": "CVE-2014-0386",
"references": [
"http://osvdb.org/102069",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64904",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90380",
"http://osvdb.org/102069",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64904",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90380"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0393": {
"id": "CVE-2014-0393",
"references": [
"http://osvdb.org/102075",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64877",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90386",
"http://osvdb.org/102075",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64877",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90386"
],
"score": 3.3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0401": {
"id": "CVE-2014-0401",
"references": [
"http://osvdb.org/102071",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64898",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90382",
"http://osvdb.org/102071",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64898",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90382"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0402": {
"id": "CVE-2014-0402",
"references": [
"http://osvdb.org/102068",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64908",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90379",
"http://osvdb.org/102068",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64908",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90379"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0412": {
"id": "CVE-2014-0412",
"references": [
"http://osvdb.org/102067",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64880",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90378",
"http://osvdb.org/102067",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64880",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90378"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0420": {
"id": "CVE-2014-0420",
"references": [
"http://osvdb.org/102077",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64888",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90388",
"http://osvdb.org/102077",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64888",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90388"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0437": {
"id": "CVE-2014-0437",
"references": [
"http://osvdb.org/102074",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64849",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90385",
"http://osvdb.org/102074",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64849",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90385"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2419": {
"id": "CVE-2014-2419",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66880",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66880"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2430": {
"id": "CVE-2014-2430",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66858",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66858"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2431": {
"id": "CVE-2014-2431",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66890",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66890"
],
"score": 2.6,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2432": {
"id": "CVE-2014-2432",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66875",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66875"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2436": {
"id": "CVE-2014-2436",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66896",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66896"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2438": {
"id": "CVE-2014-2438",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66846",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66846"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2440": {
"id": "CVE-2014-2440",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66850",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66850"
],
"score": 5.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
"vector_string": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2494": {
"id": "CVE-2014-2494",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4207": {
"id": "CVE-2014-4207",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68593",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94624",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68593",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94624"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4243": {
"id": "CVE-2014-4243",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68611",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94628",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68611",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94628"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4258": {
"id": "CVE-2014-4258",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68564",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94620",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68564",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94620"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4260": {
"id": "CVE-2014-4260",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68573",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94621",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68573",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94621"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4274": {
"id": "CVE-2014-4274",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/69732",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/69732"
],
"score": 4.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.",
"vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4287": {
"id": "CVE-2014-4287",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70517",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70517"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6463": {
"id": "CVE-2014-6463",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70532",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70532"
],
"score": 3.3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.",
"vector_string": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6464": {
"id": "CVE-2014-6464",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70451",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70451"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6469": {
"id": "CVE-2014-6469",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70446",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70446"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6478": {
"id": "CVE-2014-6478",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70489",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70489"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6484": {
"id": "CVE-2014-6484",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70455",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70455"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6491": {
"id": "CVE-2014-6491",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70444",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70444"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6494": {
"id": "CVE-2014-6494",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70497",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70497"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6495": {
"id": "CVE-2014-6495",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70496",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70496"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6496": {
"id": "CVE-2014-6496",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70469",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70469"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6500": {
"id": "CVE-2014-6500",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70478",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70478"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6505": {
"id": "CVE-2014-6505",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70516",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70516"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6507": {
"id": "CVE-2014-6507",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70550",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70550"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6520": {
"id": "CVE-2014-6520",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70510",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70510"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6530": {
"id": "CVE-2014-6530",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70486",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70486"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6551": {
"id": "CVE-2014-6551",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70462",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70462"
],
"score": 2.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6555": {
"id": "CVE-2014-6555",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70530",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70530"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6559": {
"id": "CVE-2014-6559",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70487",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70487"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6568": {
"id": "CVE-2014-6568",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72210",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72210",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0374": {
"id": "CVE-2015-0374",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72227",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72227",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0381": {
"id": "CVE-2015-0381",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72214",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72214",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0382": {
"id": "CVE-2015-0382",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72200",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72200",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0391": {
"id": "CVE-2015-0391",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72205",
"http://www.securitytracker.com/id/1031581",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72205",
"http://www.securitytracker.com/id/1031581",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0411": {
"id": "CVE-2015-0411",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72191",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72191",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0432": {
"id": "CVE-2015-0432",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72217",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72217",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0433": {
"id": "CVE-2015-0433",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0441": {
"id": "CVE-2015-0441",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0499": {
"id": "CVE-2015-0499",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0501": {
"id": "CVE-2015-0501",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 5.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0505": {
"id": "CVE-2015-0505",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74112",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74112",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2325": {
"id": "CVE-2015-2325",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
"https://bugs.exim.org/show_bug.cgi?id=1591",
"https://fortiguard.com/zeroday/FG-VD-15-015",
"https://www.pcre.org/original/changelog.txt",
"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
"https://bugs.exim.org/show_bug.cgi?id=1591",
"https://fortiguard.com/zeroday/FG-VD-15-015",
"https://www.pcre.org/original/changelog.txt"
],
"score": 7.8,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-125"
},
"CVE-2015-2568": {
"id": "CVE-2015-2568",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74073",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74073",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2571": {
"id": "CVE-2015-2571",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74095",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74095",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2573": {
"id": "CVE-2015-2573",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74078",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74078",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2582": {
"id": "CVE-2015-2582",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75751",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75751",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2620": {
"id": "CVE-2015-2620",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75837",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75837",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2643": {
"id": "CVE-2015-2643",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75830",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75830",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2648": {
"id": "CVE-2015-2648",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75822",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75822",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-3152": {
"id": "CVE-2015-3152",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
"http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
"http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
"http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.ocert.org/advisories/ocert-2015-003.html",
"http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
"http://www.securityfocus.com/bid/74398",
"http://www.securitytracker.com/id/1032216",
"https://access.redhat.com/security/cve/cve-2015-3152",
"https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
"https://jira.mariadb.org/browse/MDEV-7937",
"https://www.duosecurity.com/blog/backronym-mysql-vulnerability",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
"http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
"http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
"http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.ocert.org/advisories/ocert-2015-003.html",
"http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
"http://www.securityfocus.com/bid/74398",
"http://www.securitytracker.com/id/1032216",
"https://access.redhat.com/security/cve/cve-2015-3152",
"https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
"https://jira.mariadb.org/browse/MDEV-7937",
"https://www.duosecurity.com/blog/backronym-mysql-vulnerability"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a \"BACKRONYM\" attack.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-295"
},
"CVE-2015-4752": {
"id": "CVE-2015-4752",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75849",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75849",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4757": {
"id": "CVE-2015-4757",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75759",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75759",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4792": {
"id": "CVE-2015-4792",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77171",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77171",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 1.7,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.",
"vector_string": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4802": {
"id": "CVE-2015-4802",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77165",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77165",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4807": {
"id": "CVE-2015-4807",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77205",
"http://www.securitytracker.com/id/1033894",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77205",
"http://www.securitytracker.com/id/1033894",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4815": {
"id": "CVE-2015-4815",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77222",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77222",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4816": {
"id": "CVE-2015-4816",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77134",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77134",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4819": {
"id": "CVE-2015-4819",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77196",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77196",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 7.2,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4826": {
"id": "CVE-2015-4826",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77237",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77237",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4830": {
"id": "CVE-2015-4830",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77228",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77228",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4836": {
"id": "CVE-2015-4836",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77190",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77190",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4858": {
"id": "CVE-2015-4858",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77145",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77145",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4861": {
"id": "CVE-2015-4861",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77137",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77137",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4864": {
"id": "CVE-2015-4864",
"references": [
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77187",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77187",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4870": {
"id": "CVE-2015-4870",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77208",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.exploit-db.com/exploits/39867/",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77208",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.exploit-db.com/exploits/39867/",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4879": {
"id": "CVE-2015-4879",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77140",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77140",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 4.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.",
"vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4913": {
"id": "CVE-2015-4913",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77153",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77153",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-7744": {
"id": "CVE-2015-7744",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708",
"https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
"https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708",
"https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
"https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0502": {
"id": "CVE-2016-0502",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0610": {
"id": "CVE-2016-0610",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securityfocus.com/bid/81198",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securityfocus.com/bid/81198",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0616": {
"id": "CVE-2016-0616",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3453",
"http://www.debian.org/security/2016/dsa-3459",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/81176",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
"https://mariadb.com/kb/en/mdb-10023-rn/",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3453",
"http://www.debian.org/security/2016/dsa-3459",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/81176",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
"https://mariadb.com/kb/en/mdb-10023-rn/"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0642": {
"id": "CVE-2016-0642",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3557",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securityfocus.com/bid/86445",
"http://www.securitytracker.com/id/1035606",
"http://www.ubuntu.com/usn/USN-2953-1",
"http://www.ubuntu.com/usn/USN-2954-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3557",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securityfocus.com/bid/86445",
"http://www.securitytracker.com/id/1035606",
"http://www.ubuntu.com/usn/USN-2953-1",
"http://www.ubuntu.com/usn/USN-2954-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 4.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0651": {
"id": "CVE-2016-0651",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securitytracker.com/id/1035606",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securitytracker.com/id/1035606",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-3471": {
"id": "CVE-2016-3471",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.securityfocus.com/bid/91787",
"http://www.securityfocus.com/bid/91913",
"http://www.securitytracker.com/id/1036362",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.securityfocus.com/bid/91787",
"http://www.securityfocus.com/bid/91913",
"http://www.securitytracker.com/id/1036362",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-3492": {
"id": "CVE-2016-3492",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93650",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93650",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5584": {
"id": "CVE-2016-5584",
"references": [
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93735",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93735",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5612": {
"id": "CVE-2016-5612",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-1601.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93630",
"http://www.securitytracker.com/id/1037050",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-1601.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93630",
"http://www.securitytracker.com/id/1037050",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5624": {
"id": "CVE-2016-5624",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93635",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93635",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5626": {
"id": "CVE-2016-5626",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93638",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93638",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5629": {
"id": "CVE-2016-5629",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93668",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93668",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-6664": {
"id": "CVE-2016-6664",
"references": [
"http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
"http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://seclists.org/fulldisclosure/2016/Nov/4",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/archive/1/539695/100/0/threaded",
"http://www.securityfocus.com/bid/93612",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-18",
"https://www.exploit-db.com/exploits/40679/",
"https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/",
"http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
"http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://seclists.org/fulldisclosure/2016/Nov/4",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/archive/1/539695/100/0/threaded",
"http://www.securityfocus.com/bid/93612",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-18",
"https://www.exploit-db.com/exploits/40679/",
"https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/"
],
"score": 7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-59"
},
"CVE-2016-7440": {
"id": "CVE-2016-7440",
"references": [
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93659",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html",
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93659",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-9843": {
"id": "CVE-2016-9843",
"references": [
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
"https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
"https://security.gentoo.org/glsa/201701-56",
"https://security.gentoo.org/glsa/202007-54",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://usn.ubuntu.com/4246-1/",
"https://usn.ubuntu.com/4292-1/",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
"https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
"https://security.gentoo.org/glsa/201701-56",
"https://security.gentoo.org/glsa/202007-54",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://usn.ubuntu.com/4246-1/",
"https://usn.ubuntu.com/4292-1/",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"https://www.oracle.com/security-alerts/cpujul2020.html"
],
"score": 9.8,
"services": [
"3306/mysql"
],
"severity": "critical",
"summary": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-10268": {
"id": "CVE-2017-10268",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101390",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101390",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-10378": {
"id": "CVE-2017-10378",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101375",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101375",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-10379": {
"id": "CVE-2017-10379",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101415",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101415",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-863"
},
"CVE-2017-10384": {
"id": "CVE-2017-10384",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101406",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101406",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-15365": {
"id": "CVE-2017-15365",
"references": [
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
"https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
"https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
"https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
"https://www.debian.org/security/2018/dsa-4341",
"https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
"https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
"https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
"https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
"https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
"https://www.debian.org/security/2018/dsa-4341",
"https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
"https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html"
],
"score": 8.8,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3238": {
"id": "CVE-2017-3238",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95571",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95571",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3243": {
"id": "CVE-2017-3243",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95538",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95538",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3244": {
"id": "CVE-2017-3244",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95565",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95565",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3258": {
"id": "CVE-2017-3258",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95560",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95560",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2017-3265": {
"id": "CVE-2017-3265",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95520",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95520",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 5.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3291": {
"id": "CVE-2017-3291",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95501",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95501",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3302": {
"id": "CVE-2017-3302",
"references": [
"http://www.debian.org/security/2017/dsa-3809",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.openwall.com/lists/oss-security/2017/02/11/11",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/96162",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3809",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.openwall.com/lists/oss-security/2017/02/11/11",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/96162",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2017-3308": {
"id": "CVE-2017-3308",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97725",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97725",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 7.7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3309": {
"id": "CVE-2017-3309",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97742",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97742",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 7.7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3312": {
"id": "CVE-2017-3312",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95491",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95491",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3313": {
"id": "CVE-2017-3313",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3809",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95527",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3809",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95527",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17"
],
"score": 4.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3317": {
"id": "CVE-2017-3317",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95585",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95585",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3318": {
"id": "CVE-2017-3318",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95588",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95588",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3453": {
"id": "CVE-2017-3453",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97776",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97776",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3456": {
"id": "CVE-2017-3456",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97831",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97831",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3464": {
"id": "CVE-2017-3464",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97818",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97818",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3600": {
"id": "CVE-2017-3600",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97765",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97765",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886"
],
"score": 6.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3636": {
"id": "CVE-2017-3636",
"references": [
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99736",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99736",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3641": {
"id": "CVE-2017-3641",
"references": [
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99767",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99767",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3651": {
"id": "CVE-2017-3651",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99802",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99802",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3653": {
"id": "CVE-2017-3653",
"references": [
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99810",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99810",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955"
],
"score": 3.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2562": {
"id": "CVE-2018-2562",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102713",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102713",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 7.1,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2622": {
"id": "CVE-2018-2622",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102706",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102706",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2640": {
"id": "CVE-2018-2640",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102678",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102678",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2665": {
"id": "CVE-2018-2665",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102681",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102681",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2668": {
"id": "CVE-2018-2668",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102682",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102682",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2755": {
"id": "CVE-2018-2755",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103807",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103807",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 7.7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2761": {
"id": "CVE-2018-2761",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103820",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103820",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2767": {
"id": "CVE-2018-2767",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/103954",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/103954",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 3.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2771": {
"id": "CVE-2018-2771",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103828",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103828",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2781": {
"id": "CVE-2018-2781",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103825",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103825",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2813": {
"id": "CVE-2018-2813",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103830",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103830",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2817": {
"id": "CVE-2018-2817",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103818",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103818",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2819": {
"id": "CVE-2018-2819",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103814",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103814",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3058": {
"id": "CVE-2018-3058",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3063": {
"id": "CVE-2018-3063",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104786",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104786",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3066": {
"id": "CVE-2018-3066",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 3.3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3081": {
"id": "CVE-2018-3081",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104779",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104779",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3133": {
"id": "CVE-2018-3133",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3174": {
"id": "CVE-2018-3174",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105612",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105612",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3282": {
"id": "CVE-2018-3282",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2455": {
"id": "CVE-2019-2455",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106628",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106628",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2481": {
"id": "CVE-2019-2481",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2503": {
"id": "CVE-2019-2503",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106626",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106626",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 6.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2529": {
"id": "CVE-2019-2529",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2614": {
"id": "CVE-2019-2614",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://support.f5.com/csp/article/K52514501",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://support.f5.com/csp/article/K52514501",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2627": {
"id": "CVE-2019-2627",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://support.f5.com/csp/article/K32798641",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://support.f5.com/csp/article/K32798641",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2737": {
"id": "CVE-2019-2737",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2739": {
"id": "CVE-2019-2739",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 5.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2740": {
"id": "CVE-2019-2740",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K03444640",
"https://support.f5.com/csp/article/K03444640?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K03444640",
"https://support.f5.com/csp/article/K03444640?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2805": {
"id": "CVE-2019-2805",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K04831884",
"https://support.f5.com/csp/article/K04831884?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K04831884",
"https://support.f5.com/csp/article/K04831884?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2974": {
"id": "CVE-2019-2974",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20191017-0002/",
"https://usn.ubuntu.com/4195-1/",
"https://usn.ubuntu.com/4195-2/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20191017-0002/",
"https://usn.ubuntu.com/4195-1/",
"https://usn.ubuntu.com/4195-2/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-14550": {
"id": "CVE-2020-14550",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://usn.ubuntu.com/4441-1/",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://usn.ubuntu.com/4441-1/",
"https://www.oracle.com/security-alerts/cpujul2020.html"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-2574": {
"id": "CVE-2020-2574",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
"http://www.openwall.com/lists/oss-security/2020/09/29/1",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200122-0002/",
"https://usn.ubuntu.com/4250-1/",
"https://usn.ubuntu.com/4250-2/",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
"http://www.openwall.com/lists/oss-security/2020/09/29/1",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200122-0002/",
"https://usn.ubuntu.com/4250-1/",
"https://usn.ubuntu.com/4250-2/",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-2752": {
"id": "CVE-2020-2752",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-2780": {
"id": "CVE-2020-2780",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-2812": {
"id": "CVE-2020-2812",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-28912": {
"id": "CVE-2020-28912",
"references": [
"https://hackerone.com/reports/1019891",
"https://jira.mariadb.org/browse/MDEV-24040",
"https://hackerone.com/reports/1019891",
"https://jira.mariadb.org/browse/MDEV-24040"
],
"score": 7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-2922": {
"id": "CVE-2020-2922",
"references": [
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 3.7,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-2007": {
"id": "CVE-2021-2007",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 3.7,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-2011": {
"id": "CVE-2021-2011",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-2144": {
"id": "CVE-2021-2144",
"references": [
"https://security.netapp.com/advisory/ntap-20210513-0002/",
"https://www.oracle.com/security-alerts/cpuapr2021.html",
"https://security.netapp.com/advisory/ntap-20210513-0002/",
"https://www.oracle.com/security-alerts/cpuapr2021.html"
],
"score": 7.2,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-46659": {
"id": "CVE-2021-46659",
"references": [
"https://jira.mariadb.org/browse/MDEV-25631",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220311-0003/",
"https://jira.mariadb.org/browse/MDEV-25631",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220311-0003/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-46666": {
"id": "CVE-2021-46666",
"references": [
"https://jira.mariadb.org/browse/MDEV-25635",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/",
"https://jira.mariadb.org/browse/MDEV-25635",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-617"
},
"CVE-2021-46667": {
"id": "CVE-2021-46667",
"references": [
"https://jira.mariadb.org/browse/MDEV-26350",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/",
"https://jira.mariadb.org/browse/MDEV-26350",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-46669": {
"id": "CVE-2021-46669",
"references": [
"https://jira.mariadb.org/browse/MDEV-25638",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/",
"https://jira.mariadb.org/browse/MDEV-25638",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2022-27385": {
"id": "CVE-2022-27385",
"references": [
"https://jira.mariadb.org/browse/MDEV-26415",
"https://security.netapp.com/advisory/ntap-20220526-0008/",
"https://jira.mariadb.org/browse/MDEV-26415",
"https://security.netapp.com/advisory/ntap-20220526-0008/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-89"
},
"CVE-2022-27449": {
"id": "CVE-2022-27449",
"references": [
"https://jira.mariadb.org/browse/MDEV-28089",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220526-0006/",
"https://jira.mariadb.org/browse/MDEV-28089",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2022-31621": {
"id": "CVE-2022-31621",
"references": [
"https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-31622": {
"id": "CVE-2022-31622",
"references": [
"https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-31623": {
"id": "CVE-2022-31623",
"references": [
"https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
"https://github.com/MariaDB/server/pull/1938",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
"https://github.com/MariaDB/server/pull/1938",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-31624": {
"id": "CVE-2022-31624",
"references": [
"https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
"https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
"https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2023-5157": {
"id": "CVE-2023-5157",
"references": [
"https://access.redhat.com/errata/RHSA-2023:5683",
"https://access.redhat.com/errata/RHSA-2023:5684",
"https://access.redhat.com/errata/RHSA-2023:6821",
"https://access.redhat.com/errata/RHSA-2023:6822",
"https://access.redhat.com/errata/RHSA-2023:6883",
"https://access.redhat.com/errata/RHSA-2023:7633",
"https://access.redhat.com/security/cve/CVE-2023-5157",
"https://bugzilla.redhat.com/show_bug.cgi?id=2240246",
"https://access.redhat.com/errata/RHSA-2023:5683",
"https://access.redhat.com/errata/RHSA-2023:5684",
"https://access.redhat.com/errata/RHSA-2023:6821",
"https://access.redhat.com/errata/RHSA-2023:6822",
"https://access.redhat.com/errata/RHSA-2023:6883",
"https://access.redhat.com/errata/RHSA-2023:7633",
"https://access.redhat.com/security/cve/CVE-2023-5157",
"https://bugzilla.redhat.com/show_bug.cgi?id=2240246"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
}
}
}