Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

175.96.49.93

SummaryCVE DetailsRaw Data
29 Nov 2025, 10:23:59 UTC
{
  "scan_id": 1764404504,
  "ip": "175.96.49.93",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "175.96.0.0/15",
    "postal_code": "",
    "coordinates": {
      "latitude": "24",
      "longitude": "121"
    },
    "geo_point": "24, 121",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "TW",
    "country_name": "Taiwan",
    "city": ""
  },
  "location_updated_at": "2025-11-28T16:42:04Z",
  "asn": {
    "number": "AS9924",
    "organization": "Taiwan Fixed Network, Telco and Network Service Provider.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "175.96.0.0/14",
    "organization": "Taiwan Fixed Network CO.,LTD.",
    "descr": "Taiwan Fixed Network CO.,LTD.,\n6FI., No. 498, Ruei-Guang Rd., Nei-Hu,\nTaipei Taiwan 114",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T19:03:46Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-11-28T16:42:04Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-11-28T21:56:09Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-11-28T16:42:04Z"
    }
  ],
  "hostnames": [
    {
      "name": "175-96-49-93.dynamic.tfn.net.tw",
      "last_updated_at": "2025-11-29T11:20:16.869564317Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "ftp",
      "version": "",
      "product": "Dionaea honeypot ftpd",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "ftp": {
          "banner": "220 Welcome to the ftp service\r\n"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-25T12:57:35.945Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "honeypot",
      "version": "",
      "product": "Dionaea Honeypot httpd",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "http": {
          "body": "<html>TODO: PUT YOUR HTML HERE</html>\n",
          "body_murmur": 1530727473,
          "body_sha256": "c421ab331708073cdd2bff171edb5664ce5bd6d91a8b056e2485c188d138af72",
          "content_length": 38,
          "headers": {
            "connection": [
              "close"
            ],
            "content_length": [
              "38"
            ]
          },
          "protocol": "HTTP/1.0",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "175.96.49.93",
              "path": "",
              "scheme": "http"
            }
          },
          "status_code": 200
        }
      },
      "url": "http://175.96.49.93/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-21T01:05:34.093Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "honeypot",
      "version": "",
      "product": "Dionaea Honeypot httpd",
      "extra_info": "",
      "tunnel": "ssl",
      "modules": {
        "http": {
          "body": "<html>TODO: PUT YOUR HTML HERE</html>\n",
          "body_murmur": 1530727473,
          "body_sha256": "c421ab331708073cdd2bff171edb5664ce5bd6d91a8b056e2485c188d138af72",
          "content_length": 38,
          "headers": {
            "connection": [
              "close"
            ],
            "content_length": [
              "38"
            ]
          },
          "protocol": "HTTP/1.0",
          "request": {
            "headers": {
              "accept": [
                "*/*"
              ],
              "user_agent": [
                "Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
              ]
            },
            "method": "GET",
            "url": {
              "host": "175.96.49.93",
              "path": "",
              "scheme": "https"
            }
          },
          "status_code": 200
        },
        "tls": {
          "certificate": {
            "extensions": {
              "ns_cert_type": {
                "ssl_server": true
              },
              "ns_ssl_server_name": "localhost"
            },
            "fingerprint_md5": "D25AE1A6DCA8598E6C79067D3B6E3DF0",
            "fingerprint_sha1": "289C96B02ACD7004DCC785137D804978715A5977",
            "fingerprint_sha256": "C50E38FD924016C35309F26CA7A9B26F582B95683B0B1F587B88878FC9F1AE3A",
            "issuer": {
              "common_name": [
                "Nepenthes Development Team"
              ],
              "country": [
                "DE"
              ],
              "organization": [
                "dionaea.carnivore.it"
              ],
              "organizational_unit": [
                "anv"
              ]
            },
            "issuer_dn": "/C=DE/CN=Nepenthes Development Team/O=dionaea.carnivore.it/OU=anv",
            "jarm": "05d02d12d04d04d05c05d02d05d04da441f40918707087561e2af18cf76f0e",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "1764338961",
            "signature": {
              "algorithm": {
                "name": "MD5-RSA",
                "oid": "1.2.840.113549.1.1.4"
              },
              "self_signed": true,
              "value": "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"
            },
            "subject": {
              "common_name": [
                "Nepenthes Development Team"
              ],
              "country": [
                "DE"
              ],
              "organization": [
                "dionaea.carnivore.it"
              ],
              "organizational_unit": [
                "anv"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "Nepenthes Development Team"
              ],
              "extended_dns_names": []
            },
            "subject_dn": "/C=DE/CN=Nepenthes Development Team/O=dionaea.carnivore.it/OU=anv",
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "c4d720be6f6fe45aaea0b2ff3dd4242a80c4e2254710abb399e6ce158e284077",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048,
                "modulus": "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"
              }
            },
            "tbs_fingerprint": "f768cfe2d3471adf1d4aa72ef68b3c13d770f53edd8c7ab45caaeb65477ca8ea",
            "validation_level": "OV",
            "validity": {
              "length_seconds": 31536000,
              "not_after": "2026-11-28T14:09:22",
              "not_before": "2025-11-28T14:09:22"
            },
            "version": 2
          },
          "fingerprint_sha256": "C50E38FD924016C35309F26CA7A9B26F582B95683B0B1F587B88878FC9F1AE3A",
          "precert": false,
          "raw": "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",
          "tags": [
            "ov",
            "self_signed",
            "root"
          ]
        }
      },
      "url": "https://175.96.49.93/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-28T14:42:55.023Z"
    },
    {
      "port": 445,
      "protocol": "tcp",
      "name": "microsoft-ds",
      "version": "",
      "product": "Dionaea honeypot smbd",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "smb": {
          "capabilities": [],
          "negotiation": [],
          "smbv1_support": true,
          "version": "1.0.0"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-28T21:06:19.553Z"
    },
    {
      "port": 1433,
      "protocol": "tcp",
      "name": "ms-sql-s",
      "version": "",
      "product": "Dionaea honeypot MS-SQL server",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "mssql": {
          "encrypt_mode": "ENCRYPT_NOT_SUP",
          "instance_name": "",
          "version": "8.0.528"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-29T10:23:59.279Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.0.54",
      "product": "MySQL",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mysql:mysql:5.0.54",
          "part": "a",
          "vendor": "mysql",
          "product": "mysql",
          "version": "5\\.0\\.54",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.0.54"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-5925",
          "score": 4,
          "severity": "medium"
        },
        {
          "id": "CVE-2008-0226",
          "score": 7.5,
          "severity": "high"
        },
        {
          "id": "CVE-2008-2079",
          "score": 4.6,
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-29T09:21:54.436Z"
    },
    {
      "port": 5060,
      "protocol": "tcp",
      "name": "sip",
      "version": "",
      "product": "",
      "extra_info": "SIP end point; Status: 200 OK",
      "tunnel": "",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-27T06:36:08.683Z"
    }
  ],
  "services_hash": "b9ad68cf18b07c215182780ea5ae90c236db2180ee21783cdb6e77653351f33b",
  "last_updated_at": "2025-11-29T10:23:59.279Z",
  "banner": [
    "mssql",
    "mysql",
    "ftp",
    "http",
    "tls",
    "smb"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2007-5925": {
      "id": "CVE-2007-5925",
      "references": [
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html",
        "http://bugs.gentoo.org/show_bug.cgi?id=198988",
        "http://bugs.mysql.com/bug.php?id=32125",
        "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html",
        "http://secunia.com/advisories/27568",
        "http://secunia.com/advisories/27649",
        "http://secunia.com/advisories/27823",
        "http://secunia.com/advisories/28025",
        "http://secunia.com/advisories/28040",
        "http://secunia.com/advisories/28099",
        "http://secunia.com/advisories/28108",
        "http://secunia.com/advisories/28128",
        "http://secunia.com/advisories/28838",
        "http://security.gentoo.org/glsa/glsa-200711-25.xml",
        "http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.428959",
        "http://www.debian.org/security/2007/dsa-1413",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243",
        "http://www.redhat.com/support/errata/RHSA-2007-1155.html",
        "http://www.redhat.com/support/errata/RHSA-2007-1157.html",
        "http://www.securityfocus.com/bid/26353",
        "http://www.securitytracker.com/id?1018978",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2007/3903",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390",
        "https://usn.ubuntu.com/559-1/",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html",
        "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2008-0226": {
      "id": "CVE-2008-0226",
      "references": [
        "http://bugs.mysql.com/33814",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
        "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
        "http://secunia.com/advisories/28324",
        "http://secunia.com/advisories/28419",
        "http://secunia.com/advisories/28597",
        "http://secunia.com/advisories/29443",
        "http://secunia.com/advisories/32222",
        "http://securityreason.com/securityalert/3531",
        "http://support.apple.com/kb/HT3216",
        "http://www.debian.org/security/2008/dsa-1478",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150",
        "http://www.securityfocus.com/archive/1/485810/100/0/threaded",
        "http://www.securityfocus.com/archive/1/485811/100/0/threaded",
        "http://www.securityfocus.com/bid/27140",
        "http://www.securityfocus.com/bid/31681",
        "http://www.ubuntu.com/usn/usn-588-1",
        "http://www.vupen.com/english/advisories/2008/0560/references",
        "http://www.vupen.com/english/advisories/2008/2780",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer& operator>>\" in yassl_imp.cpp.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2008-2079": {
      "id": "CVE-2008-2079",
      "references": [
        "http://bugs.mysql.com/bug.php?id=32167",
        "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html",
        "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html",
        "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
        "http://secunia.com/advisories/30134",
        "http://secunia.com/advisories/31066",
        "http://secunia.com/advisories/31226",
        "http://secunia.com/advisories/31687",
        "http://secunia.com/advisories/32222",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/36566",
        "http://secunia.com/advisories/36701",
        "http://support.apple.com/kb/HT3216",
        "http://support.apple.com/kb/HT3865",
        "http://www.debian.org/security/2008/dsa-1608",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150",
        "http://www.redhat.com/support/errata/RHSA-2008-0505.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0510.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0768.html",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.securityfocus.com/bid/29106",
        "http://www.securityfocus.com/bid/31681",
        "http://www.securitytracker.com/id?1019995",
        "http://www.ubuntu.com/usn/USN-671-1",
        "http://www.vupen.com/english/advisories/2008/1472/references",
        "http://www.vupen.com/english/advisories/2008/2780",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133",
        "http://bugs.mysql.com/bug.php?id=32167",
        "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html",
        "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html",
        "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html",
        "http://secunia.com/advisories/30134",
        "http://secunia.com/advisories/31066",
        "http://secunia.com/advisories/31226",
        "http://secunia.com/advisories/31687",
        "http://secunia.com/advisories/32222",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/36566",
        "http://secunia.com/advisories/36701",
        "http://support.apple.com/kb/HT3216",
        "http://support.apple.com/kb/HT3865",
        "http://www.debian.org/security/2008/dsa-1608",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150",
        "http://www.redhat.com/support/errata/RHSA-2008-0505.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0510.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0768.html",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.securityfocus.com/bid/29106",
        "http://www.securityfocus.com/bid/31681",
        "http://www.securitytracker.com/id?1019995",
        "http://www.ubuntu.com/usn/USN-671-1",
        "http://www.vupen.com/english/advisories/2008/1472/references",
        "http://www.vupen.com/english/advisories/2008/2780",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-264"
    },
    "CVE-2008-3963": {
      "id": "CVE-2008-3963",
      "references": [
        "http://bugs.mysql.com/bug.php?id=35658",
        "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html",
        "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html",
        "http://secunia.com/advisories/31769",
        "http://secunia.com/advisories/32759",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/34907",
        "http://secunia.com/advisories/36566",
        "http://www.debian.org/security/2009/dsa-1783",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
        "http://www.openwall.com/lists/oss-security/2008/09/09/4",
        "http://www.openwall.com/lists/oss-security/2008/09/09/7",
        "http://www.redhat.com/support/errata/RHSA-2009-1067.html",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.securitytracker.com/id?1020858",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.ubuntu.com/usn/USN-671-1",
        "http://www.vupen.com/english/advisories/2008/2554",
        "https://bugs.gentoo.org/237166",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-134"
    },
    "CVE-2008-4098": {
      "id": "CVE-2008-4098",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25",
        "http://bugs.mysql.com/bug.php?id=32167",
        "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html",
        "http://secunia.com/advisories/32578",
        "http://secunia.com/advisories/32759",
        "http://secunia.com/advisories/32769",
        "http://secunia.com/advisories/38517",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.debian.org/security/2008/dsa-1662",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094",
        "http://www.openwall.com/lists/oss-security/2008/09/09/20",
        "http://www.openwall.com/lists/oss-security/2008/09/16/3",
        "http://www.redhat.com/support/errata/RHSA-2009-1067.html",
        "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.ubuntu.com/usn/USN-671-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2008-7247": {
      "id": "CVE-2008-7247",
      "references": [
        "http://bugs.mysql.com/bug.php?id=39277",
        "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
        "http://lists.mysql.com/commits/59711",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://marc.info/?l=oss-security&m=125908040022018&w=2",
        "http://secunia.com/advisories/38517",
        "http://support.apple.com/kb/HT4077",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044",
        "http://www.securityfocus.com/bid/38043",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://bugzilla.redhat.com/show_bug.cgi?id=543619"
      ],
      "score": 6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2009-0819": {
      "id": "CVE-2009-0819",
      "references": [
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544",
        "http://bugs.mysql.com/bug.php?id=42495",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html",
        "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html",
        "http://secunia.com/advisories/34115",
        "http://www.securityfocus.com/bid/33972",
        "http://www.securitytracker.com/id?1021786",
        "http://www.vupen.com/english/advisories/2009/0594",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2009-2446": {
      "id": "CVE-2009-2446",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html",
        "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
        "http://secunia.com/advisories/35767",
        "http://secunia.com/advisories/36566",
        "http://secunia.com/advisories/38517",
        "http://securitytracker.com/id?1022533",
        "http://support.apple.com/kb/HT4077",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179",
        "http://www.osvdb.org/55734",
        "http://www.redhat.com/support/errata/RHSA-2009-1289.html",
        "http://www.redhat.com/support/errata/RHSA-2010-0110.html",
        "http://www.securityfocus.com/archive/1/504799/100/0/threaded",
        "http://www.securityfocus.com/bid/35609",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2009/1857",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857"
      ],
      "score": 8.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.",
      "vector_string": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
      "weakness": "CWE-134"
    },
    "CVE-2009-4019": {
      "id": "CVE-2009-4019",
      "references": [
        "http://bugs.mysql.com/47780",
        "http://bugs.mysql.com/48291",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://marc.info/?l=oss-security&m=125883754215621&w=2",
        "http://marc.info/?l=oss-security&m=125901161824278&w=2",
        "http://secunia.com/advisories/37717",
        "http://secunia.com/advisories/38517",
        "http://secunia.com/advisories/38573",
        "http://support.apple.com/kb/HT4077",
        "http://ubuntu.com/usn/usn-897-1",
        "http://www.debian.org/security/2010/dsa-1997",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://bugzilla.redhat.com/show_bug.cgi?id=540906",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500",
        "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2009-4028": {
      "id": "CVE-2009-4028",
      "references": [
        "http://bugs.mysql.com/47320",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.mysql.com/commits/87446",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://www.openwall.com/lists/oss-security/2009/11/19/3",
        "http://www.openwall.com/lists/oss-security/2009/11/23/16",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510",
        "http://bugs.mysql.com/47320",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html",
        "http://lists.mysql.com/commits/87446",
        "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html",
        "http://marc.info/?l=oss-security&m=125881733826437&w=2",
        "http://www.openwall.com/lists/oss-security/2009/11/19/3",
        "http://www.openwall.com/lists/oss-security/2009/11/23/16",
        "http://www.redhat.com/support/errata/RHSA-2010-0109.html",
        "http://www.vupen.com/english/advisories/2010/1107",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2010-1621": {
      "id": "CVE-2010-1621",
      "references": [
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://bugs.mysql.com/bug.php?id=51770",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093",
        "http://www.securityfocus.com/bid/39543",
        "http://www.ubuntu.com/usn/USN-1397-1"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-264"
    },
    "CVE-2010-1626": {
      "id": "CVE-2010-1626",
      "references": [
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490",
        "http://bugs.mysql.com/bug.php?id=40980",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html",
        "http://securitytracker.com/id?1024004",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101",
        "http://www.openwall.com/lists/oss-security/2010/05/10/2",
        "http://www.openwall.com/lists/oss-security/2010/05/18/4",
        "http://www.redhat.com/support/errata/RHSA-2010-0442.html",
        "http://www.securityfocus.com/bid/40257",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2010/1194",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490"
      ],
      "score": 3.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.",
      "vector_string": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2010-3677": {
      "id": "CVE-2010-3677",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688",
        "http://bugs.mysql.com/bug.php?id=54575",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42646",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628040",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3682": {
      "id": "CVE-2010-3682",
      "references": [
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684",
        "http://bugs.mysql.com/bug.php?id=52711",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012",
        "http://www.openwall.com/lists/oss-security/2010/09/28/10",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/42599",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0133",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=628328",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2010-3833": {
      "id": "CVE-2010-3833",
      "references": [
        "http://bugs.mysql.com/bug.php?id=55826",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640751",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\"",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3834": {
      "id": "CVE-2010-3834",
      "references": [
        "http://bugs.mysql.com/bug.php?id=55568",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640808",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2010-3836": {
      "id": "CVE-2010-3836",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54568",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640845",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3837": {
      "id": "CVE-2010-3837",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54476",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640856",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2010-3838": {
      "id": "CVE-2010-3838",
      "references": [
        "http://bugs.mysql.com/bug.php?id=54461",
        "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html",
        "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html",
        "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html",
        "http://secunia.com/advisories/42875",
        "http://secunia.com/advisories/42936",
        "http://support.apple.com/kb/HT4723",
        "http://www.debian.org/security/2011/dsa-2143",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223",
        "http://www.redhat.com/support/errata/RHSA-2010-0825.html",
        "http://www.redhat.com/support/errata/RHSA-2011-0164.html",
        "http://www.securityfocus.com/bid/43676",
        "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt",
        "http://www.ubuntu.com/usn/USN-1017-1",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "http://www.vupen.com/english/advisories/2011/0105",
        "http://www.vupen.com/english/advisories/2011/0170",
        "http://www.vupen.com/english/advisories/2011/0345",
        "https://bugzilla.redhat.com/show_bug.cgi?id=640858",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function's result is \"processed using an intermediate temporary table.\"",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2012-0075": {
      "id": "CVE-2012-0075",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78374",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51526",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539"
      ],
      "score": 1.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors.",
      "vector_string": "AV:N/AC:H/Au:M/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0087": {
      "id": "CVE-2012-0087",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78377",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51509",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0101": {
      "id": "CVE-2012-0101",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78378",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0102": {
      "id": "CVE-2012-0102",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78379",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0114": {
      "id": "CVE-2012-0114",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.ubuntu.com/usn/USN-1397-1"
      ],
      "score": 3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors.",
      "vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0484": {
      "id": "CVE-2012-0484",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78372",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51515",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0490": {
      "id": "CVE-2012-0490",
      "references": [
        "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
        "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html",
        "http://osvdb.org/78388",
        "http://secunia.com/advisories/48250",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2429",
        "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
        "http://www.securityfocus.com/bid/51524",
        "http://www.ubuntu.com/usn/USN-1397-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2575": {
      "id": "CVE-2015-2575",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html",
        "http://www.debian.org/security/2016/dsa-3621",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74075",
        "http://www.securitytracker.com/id/1032121",
        "https://security.netapp.com/advisory/ntap-20150417-0003/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    }
  }
}