176.9.100.173
{
"scan_id": 1762277199,
"ip": "176.9.100.173",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "176.9.100.0/22",
"postal_code": "08223",
"coordinates": {
"latitude": "50.4777",
"longitude": "12.3649"
},
"geo_point": "50.4777, 12.3649",
"locale_code": "en",
"continent": "Europe",
"country_code": "DE",
"country_name": "Germany",
"city": "Falkenstein"
},
"location_updated_at": "2025-11-06T00:43:08Z",
"asn": {
"number": "AS24940",
"organization": "Hetzner Online GmbH",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "176.9.0.0/16",
"organization": "ORG-HOA1-RIPE",
"descr": "HETZNER-RZ-FKS-BLK4",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T08:53:12Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-11-06T00:43:08Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-11-06T02:02:48Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-11-06T00:43:08Z"
}
],
"hostnames": [
{
"name": "static.173.100.9.176.clients.your-server.de",
"last_updated_at": "2025-11-07T21:27:28.228499703Z"
}
],
"services": [
{
"port": 21,
"protocol": "tcp",
"name": "ftp",
"version": "3.0.3",
"product": "vsftpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:vsftpd:vsftpd:3.0.3",
"part": "a",
"vendor": "vsftpd",
"product": "vsftpd",
"version": "3\\.0\\.3",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ftp": {
"banner": "220 (vsFTPd 3.0.3)\r\n"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-10-31T14:43:45.184Z"
},
{
"port": 22,
"protocol": "tcp",
"name": "ssh",
"version": "7.4p1 Debian 10+deb9u7",
"product": "OpenSSH",
"extra_info": "protocol 2.0",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:openbsd:openssh:7.4p1",
"part": "a",
"vendor": "openbsd",
"product": "openssh",
"version": "7\\.4p1",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
},
{
"uri": "cpe:/o:linux:linux_kernel",
"part": "o",
"vendor": "linux",
"product": "linux_kernel",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"ssh": {
"banner": "SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u7",
"client_to_server_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"client_to_server_compression": [
"none",
"[email protected]"
],
"client_to_server_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"host_key_algorithms": [
"ssh-rsa",
"rsa-sha2-512",
"rsa-sha2-256",
"ecdsa-sha2-nistp256",
"ssh-ed25519"
],
"kex_algorithms": [
"curve25519-sha256",
"[email protected]",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group-exchange-sha256",
"diffie-hellman-group16-sha512",
"diffie-hellman-group18-sha512",
"diffie-hellman-group14-sha256",
"diffie-hellman-group14-sha1"
],
"key": {
"algorithm": "ecdsa-sha2-nistp256",
"fingerprint_sha256": "9c98dd4c81f389286534d32c9a98322e4d573d72b723fa14e48ca247c5edabd0",
"raw": "AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBFGZEiJHmQRoqBqktYRyyJ0WS+wVj7qebqickXjUJ9DWJvgnNeVFiBxX197Q6duhaTYlQ5poDEQ9AVpTr2b8gN4="
},
"server_to_client_ciphers": [
"[email protected]",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"[email protected]",
"[email protected]"
],
"server_to_client_compression": [
"none",
"[email protected]"
],
"server_to_client_macs": [
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"[email protected]",
"hmac-sha2-256",
"hmac-sha2-512",
"hmac-sha1"
],
"software": "OpenSSH_7.4p1",
"version": "2.0"
}
},
"cve": [
{
"id": "CVE-2007-2768",
"score": 4.3,
"severity": "medium"
},
{
"id": "CVE-2008-3844",
"score": 9.3,
"severity": "high"
},
{
"id": "CVE-2016-20012",
"score": 5.3,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-06T20:56:50.088Z"
},
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "4.89",
"product": "Exim smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:exim:exim:4.89",
"part": "a",
"vendor": "exim",
"product": "exim",
"version": "4\\.89",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 w4u.pp.ua ESMTP Exim 4.89 Thu, 30 Oct 2025 00:29:16 +0200\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "EA8BB7D330F4213427D30D6650D7B021",
"fingerprint_sha1": "FB8D8216CF2C98A703103F69B1DFA40E130C6E31",
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"issuer": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"issuer_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "13290162889342297129",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"subject_alt_name": {
"dns_names": [
"w4u.pp.ua"
],
"extended_dns_names": [
{
"domain": "w4u",
"fld": "w4u.pp.ua",
"tld": "pp.ua"
}
]
},
"subject_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "24b195d029151a148e102e51530eadcf1a85587b00ff1fb0a6505b71b52b7f69",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "c0c4cd7110a25a2671e2a7922f58b221d43284e56b02cb83515fde4c6cb05eaa",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2021-02-24T17:21:59",
"not_before": "2020-02-25T17:21:59"
}
},
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2017-1000369",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2017-16943",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2017-16944",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-10-31T00:40:45.325Z"
},
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n\n<html>\n <head>\n <meta charset=\"utf-8\">\n <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\">\n <title>Orthanc Explorer</title>\n\n <link rel=\"stylesheet\" href=\"libs/jquery.mobile.min.css\" />\n <link rel=\"stylesheet\" href=\"libs/jqtree.css\" />\n <link rel=\"stylesheet\" href=\"libs/jquery.mobile.simpledialog.min.css\" />\n <link rel=\"stylesheet\" href=\"libs/jquery-file-upload/css/style.css\" />\n <link rel=\"stylesheet\" href=\"libs/jquery-file-upload/css/jquery.fileupload-ui.css\" />\n <link rel=\"stylesheet\" href=\"libs/slimbox2/slimbox2.css\" />\n\n <script src=\"libs/jquery.min.js\"></script>\n <script src=\"libs/jquery.mobile.min.js\"></script>\n <script src=\"libs/jqm.page.params.js\"></script>\n <script src=\"libs/tree.jquery.js\"></script>\n <script src=\"libs/date.js\"></script>\n <script src=\"libs/jquery.mobile.simpledialog2.js\"></script>\n <script src=\"libs/slimbox2.js\"></script>\n <script src=\"libs/jquery.blockui.js\"></script>\n\n <!-- https://github.com/blueimp/jQuery-File-Upload/wiki/Basic-plugin -->\n <script src=\"libs/jquery-file-upload/js/vendor/jquery.ui.widget.js\"></script>\n <script src=\"libs/jquery-file-upload/js/jquery.iframe-transport.js\"></script>\n <script src=\"libs/jquery-file-upload/js/jquery.fileupload.js\"></script>\n\n <link rel=\"stylesheet\" href=\"explorer.css\" />\n <script src=\"file-upload.js\"></script>\n <script src=\"explorer.js\"></script>\n <script src=\"query-retrieve.js\"></script>\n <script src=\"../plugins/explorer.js\"></script>\n </head>\n <body>\n <div data-role=\"page\" id=\"find-patients\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>Find a patient</h1>\n <a href=\"#plugins\" data-icon=\"grid\" class=\"ui-btn-left\" data-direction=\"reverse\">Plugins</a>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\"> \n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n </div>\n </div>\n <div data-role=\"content\">\n <ul id=\"all-patients\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"upload\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>Upload DICOM files</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n </div>\n <div data-role=\"content\">\n <div style=\"display:none\">\n <input id=\"fileupload\" type=\"file\" name=\"files[]\" data-url=\"../instances/\" multiple>\n </div>\n <p>\n <ul data-role=\"listview\" data-inset=\"true\">\n <li data-icon=\"arrow-r\" data-theme=\"e\"><a href=\"#\" id=\"upload-button\">Start the upload</a></li>\n <!--li data-icon=\"gear\" data-theme=\"e\"><a href=\"#\" id=\"upload-abort\" class=\"ui-disabled\">Abort the current upload</a></li-->\n <li data-icon=\"delete\" data-theme=\"e\"><a href=\"#\" id=\"upload-clear\">Clear the pending uploads</a></li>\n </ul>\n <div id=\"progress\" class=\"ui-corner-all\">\n <span class=\"bar ui-corner-all\"></span>\n <div class=\"label\"></div>\n </div>\n </p>\n <ul id=\"upload-list\" data-role=\"listview\" data-inset=\"true\">\n <li data-role=\"list-divider\">Drag and drop DICOM files here</li>\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"patient\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>Patient</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\"> \n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"patient-info\">\n </ul>\n <p>\n <div class=\"switch-container\">\n <select name=\"protection\" id=\"protection\" data-role=\"slider\">\n\t <option value=\"off\">Unprotected</option>\n\t <option value=\"on\">Protected</option>\n </select>\n </div>\n </p>\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"patient-delete\">Delete this patient</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"patient-store\">Send to remote modality</a></li>\n <li data-icon=\"star\"><a href=\"#\" id=\"patient-anonymize\">Anonymize</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"patient-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"patient-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"patient-archive\">Download ZIP</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"patient-media\">Download DICOMDIR</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <ul id=\"list-studies\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"study\">\n <div data-role=\"header\">\n\t<h1>\n <span class=\"orthanc-name\"></span>\n <a href=\"#\" class=\"patient-link\">Patient</a> » \n Study\n </h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\"> \n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"study-info\">\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"study-delete\">Delete this study</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"study-store\">Send to DICOM modality</a></li>\n <li data-icon=\"star\"><a href=\"#\" id=\"study-anonymize\">Anonymize</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"study-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"study-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"study-archive\">Download ZIP</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"study-media\">Download DICOMDIR</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <ul id=\"list-series\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"series\">\n <div data-role=\"header\">\n\t<h1>\n <span class=\"orthanc-name\"></span>\n <a href=\"#\" class=\"patient-link\">Patient</a> » \n <a href=\"#\" class=\"study-link\">Study</a> » \n Series\n </h1>\n\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\"> \n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"series-info\">\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"series-delete\">Delete this series</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"series-store\">Send to DICOM modality</a></li>\n <li data-icon=\"star\"><a href=\"#\" id=\"series-anonymize\">Anonymize</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"series-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"series-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"search\"><a href=\"#\" id=\"series-preview\">Preview this series</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"series-archive\">Download ZIP</a></li>\n <li data-icon=\"gear\"><a href=\"#\" id=\"series-media\">Download DICOMDIR</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <ul id=\"list-instances\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"instance\">\n <div data-role=\"header\">\n\t<h1>\n <span class=\"orthanc-name\"></span>\n <a href=\"#\" class=\"patient-link\">Patient</a> » \n <a href=\"#\" class=\"study-link\">Study</a> » \n <a href=\"#\" class=\"series-link\">Series</a> » \n Instance\n </h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <div data-type=\"horizontal\" data-role=\"controlgroup\" class=\"ui-btn-right\"> \n <a href=\"#upload\" data-icon=\"gear\" data-role=\"button\">Upload</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" data-role=\"button\">Query/Retrieve</a>\n </div>\n </div>\n <div data-role=\"content\">\n <div class=\"ui-grid-a\">\n <div class=\"ui-block-a\" style=\"width:30%\">\n <div style=\"padding-right:10px\">\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"a\" id=\"instance-info\">\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Interact</li>\n <li data-icon=\"delete\"><a href=\"#\" id=\"instance-delete\">Delete this instance</a></li>\n <li data-icon=\"forward\"><a href=\"#\" id=\"instance-store\">Send to DICOM modality</a></li>\n </ul>\n\n <ul data-role=\"listview\" data-inset=\"true\" data-theme=\"d\" data-divider-theme=\"c\">\n <li data-role=\"list-divider\">Access</li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"instance-anonymized-from\">Before anonymization</a>\n </li>\n <li data-icon=\"info\" data-theme=\"e\" style=\"display:none\">\n <a href=\"#\" id=\"instance-modified-from\">Before modification</a>\n </li>\n <li data-icon=\"arrow-d\"><a href=\"#\" id=\"instance-download-dicom\">Download the DICOM file</a></li>\n <li data-icon=\"arrow-d\"><a href=\"#\" id=\"instance-download-json\">Download the JSON file</a></li>\n <li data-icon=\"search\"><a href=\"#\" id=\"instance-preview\">Preview the instance</a></li>\n </ul>\n </div>\n </div>\n <div class=\"ui-block-b\" style=\"width:70%\">\n <div style=\"padding:10px\">\n <div class=\"ui-body ui-body-b\">\n <h1>DICOM Tags</h1>\n <p align=\"right\">\n <input type=\"checkbox\" id=\"show-tag-name\" checked=\"checked\" class=\"custom\" data-mini=\"true\" />\n <label for=\"show-tag-name\">Show tag description</label>\n </p>\n <div id=\"dicom-tree\"></div>\n </div>\n </div>\n </div>\n </div>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"plugins\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>Plugins</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n </div>\n <div data-role=\"content\">\n <ul id=\"all-plugins\" data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n <div data-role=\"page\" id=\"query-retrieve\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (1/4)</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n </div>\n <div data-role=\"content\">\n <form data-ajax=\"false\">\n <div data-role=\"fieldcontain\">\n\t <label for=\"qr-server\">DICOM server:</label>\n <select name=\"qr-server\" id=\"qr-server\">\n </select>\n\t </div>\n\n <div data-role=\"fieldcontain\" id=\"qr-fields\">\n\t <fieldset data-role=\"controlgroup\">\n\t <legend>Field of interest:</legend>\n\t <input type=\"radio\" name=\"qr-field\" id=\"qr-patient-id\" value=\"PatientID\" checked=\"checked\" />\n\t <label for=\"qr-patient-id\">Patient ID</label>\n\t <input type=\"radio\" name=\"qr-field\" id=\"qr-patient-name\" value=\"PatientName\" />\n\t <label for=\"qr-patient-name\">Patient Name</label>\n\t <input type=\"radio\" name=\"qr-field\" id=\"qr-accession-number\" value=\"AccessionNumber\" />\n\t <label for=\"qr-accession-number\">Accession Number</label>\n\t <input type=\"radio\" name=\"qr-field\" id=\"qr-study-description\" value=\"StudyDescription\" />\n\t <label for=\"qr-study-description\">Study Description</label>\n\t </fieldset>\n\t </div>\n\n <div data-role=\"fieldcontain\">\n\t <label for=\"qr-value\">Value for this field:</label>\n\t <input type=\"text\" name=\"qr-value\" id=\"qr-value\" value=\"*\" />\n\t </div>\n\n <div data-role=\"fieldcontain\">\n\t <label for=\"qr-date\">Study date:</label>\n <select name=\"qr-date\" id=\"qr-date\">\n </select>\n\t </div>\n\n <div data-role=\"fieldcontain\" id=\"qr-modalities\">\n <div data-role=\"fieldcontain\">\n\t <fieldset data-role=\"controlgroup\" data-type=\"horizontal\">\n <legend>Modalities:</legend>\n\t <input type=\"checkbox\" name=\"CR\" id=\"qr-cr\" class=\"custom\" /> <label for=\"qr-cr\">CR</label>\n\t <input type=\"checkbox\" name=\"CT\" id=\"qr-ct\" class=\"custom\" /> <label for=\"qr-ct\">CT</label>\n\t <input type=\"checkbox\" name=\"MR\" id=\"qr-mr\" class=\"custom\" /> <label for=\"qr-mr\">MR</label>\n\t <input type=\"checkbox\" name=\"NM\" id=\"qr-nm\" class=\"custom\" /> <label for=\"qr-nm\">NM</label>\n\t <input type=\"checkbox\" name=\"PT\" id=\"qr-pt\" class=\"custom\" /> <label for=\"qr-pt\">PT</label>\n\t <input type=\"checkbox\" name=\"US\" id=\"qr-us\" class=\"custom\" /> <label for=\"qr-us\">US</label>\n\t <input type=\"checkbox\" name=\"XA\" id=\"qr-xa\" class=\"custom\" /> <label for=\"qr-xa\">XA</label>\n\t </fieldset>\n </div>\n </div>\n\n <fieldset class=\"ui-grid-a\">\n\t <div class=\"ui-block-a\">\n <button id=\"qr-echo\" data-theme=\"a\">Test Echo</button>\n </div>\n\t <div class=\"ui-block-b\">\n <button id=\"qr-submit\" type=\"submit\" data-theme=\"b\">Search studies</button>\n </div>\n\t </fieldset>\n </form>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"query-retrieve-2\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (2/4)</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n </div>\n <div data-role=\"content\">\n <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\" data-split-icon=\"arrow-d\" data-split-theme=\"b\">\n </ul>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"query-retrieve-3\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (3/4)</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n </div>\n <div data-role=\"content\">\n <ul data-role=\"listview\" data-inset=\"true\" data-filter=\"true\">\n </ul>\n </div>\n </div>\n\n\n <div data-role=\"page\" id=\"query-retrieve-4\" >\n <div data-role=\"header\" >\n\t<h1><span class=\"orthanc-name\"></span>DICOM Query/Retrieve (4/4)</h1>\n <a href=\"#find-patients\" data-icon=\"home\" class=\"ui-btn-left\" data-direction=\"reverse\">Patients</a>\n <a href=\"#query-retrieve\" data-icon=\"search\" class=\"ui-btn-right\" data-direction=\"reverse\">Query/Retrieve</a>\n </div>\n\n <div data-role=\"content\">\n <form data-ajax=\"false\" id=\"retrieve-form\">\n <div data-role=\"fieldcontain\">\n\t <label for=\"retrieve-target\">Target AET:</label>\n <input type=\"text\" name=\"retrieve-target\" id=\"retrieve-target\"></input>\n\t </div>\n\n <fieldset class=\"ui-grid-b\">\n\t <div class=\"ui-block-a\"></div>\n\t <div class=\"ui-block-b\">\n <button id=\"retrieve-submit\" type=\"submit\" data-theme=\"b\">Retrieve</button>\n </div>\n\t <div class=\"ui-block-c\"></div>\n\t </fieldset>\n </form>\n </div>\n </div>\n\n\n <div id=\"peer-store\" style=\"display:none;\" class=\"ui-body-c\">\n <p align=\"center\"><b>Sending to Orthanc peer...</b></p>\n <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n </div>\n\n <div id=\"dicom-store\" style=\"display:none;\" class=\"ui-body-c\">\n <p align=\"center\"><b>Sending to DICOM modality...</b></p>\n <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n </div>\n\n <div id=\"info-retrieve\" style=\"display:none;\" class=\"ui-body-c\">\n <p align=\"center\"><b>Retrieving images from DICOM modality...</b></p>\n <p><img src=\"libs/images/ajax-loader.gif\" alt=\"\" /></p>\n </div>\n\n <div id=\"dialog\" style=\"display:none\" >\n </div>\n </body>\n</html>\n",
"body_murmur": 1507697106,
"body_sha256": "d9fb00de4b7c87fa0e987f8578adf83dd6226b2dc1184d342bc77a74d160e7f3",
"component": [
"Nginx"
],
"content_length": -1,
"headers": {
"connection": [
"keep-alive"
],
"content_type": [
"text/html"
],
"date": [
"Mon, 03 Nov 2025 20:30:50 GMT"
],
"server": [
"nginx"
],
"strict_transport_security": [
"max-age=31536000; includeSubDomains; preload"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=60"
]
}
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"connection": [
"keep-alive"
],
"content_length": [
"0"
],
"date": [
"Mon, 03 Nov 2025 20:30:50 GMT"
],
"location": [
"app/explorer.html"
],
"server": [
"nginx"
],
"strict_transport_security": [
"max-age=31536000; includeSubDomains; preload"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=60"
]
}
]
},
"location": "app/explorer.html",
"protocol": "HTTP/1.1",
"status_code": 301,
"status_line": "301 Moved Permanently"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"http://176.9.100.173"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "176.9.100.173",
"path": "/app/explorer.html",
"scheme": "http"
}
},
"status_code": 200,
"title": "Orthanc Explorer"
}
},
"url": "http://176.9.100.173/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-03T20:30:50.842Z"
},
{
"port": 110,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Dovecot pop3d",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:dovecot:dovecot",
"part": "a",
"vendor": "dovecot",
"product": "dovecot",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"pop3": {
"banner": "+OK Dovecot ready.\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "EA8BB7D330F4213427D30D6650D7B021",
"fingerprint_sha1": "FB8D8216CF2C98A703103F69B1DFA40E130C6E31",
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"issuer": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"issuer_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "13290162889342297129",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"subject_alt_name": {
"dns_names": [
"w4u.pp.ua"
],
"extended_dns_names": [
{
"domain": "w4u",
"fld": "w4u.pp.ua",
"tld": "pp.ua"
}
]
},
"subject_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "24b195d029151a148e102e51530eadcf1a85587b00ff1fb0a6505b71b52b7f69",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "MHhlNDEwZTliNDU0MGRkNWNiOGNiMThkYjBiY2JkNmU2YjNkYWUzMGZkYjUwMGZjOGVjODk1NjZjMTE4OWFjMDg1YzU1MGE2OGI0NDY0YTQ0MGFmZGQ0ZjFjZjlmZDJkNjVlZmIxNTMyZDdkMmI4YjE0NzU2NTlhNDVlY2U0ZjhiMjVkMGQyNjk3MmIxOTVjNzJhNTIwYjlkNmRmYWFmNmQyMTVhNjZiOTRkYTE1NTdlNWEyMDA3NmExODMxOTc2MGMyYWU1MGQyYjI2YzU0ZmM0MWNjOTRhNzUzNWQ5NDMwMjY2MDBhODM2MTA4ODBlNDEwYjc5ZGUwYzkzMTk5NjIxN2E2YjI5YTQwMDNjZWI2NzQwZTIxNmNlZGMzMDIyYzJmZjc4MGY2MWMzMTIzMDNjZTMxZWU5ZTk0MjdlNzIzZTZkNGNhMTRiNmUxYmRjM2ZiOWE0ZjhhNGVjMjNlMzI5NzZkNTVkNjIwNjIzMDQyNGY4YjY0NDgxYjZkNTA5MWVkYTUyMjFiOGU5OTUzYjg4NzQ3M2FmYWI3ZmZiNmI3NzlhNTlhZTgyZjY2OTc0YzE1NTFhZmNhMTEzMTMxMDA3N2IyY2ZlMjgxOTk2MjBkZDE5NDAzYjk0MDdkYzJhYjQ5NTc0ZjliYmM3ZjE3YjlkZDAyOTNiMjhkYTYzNTkxNDliODFlMWMwM2UwOTNjZjdmY2Q1NDc1OWRiM2Y4NWFkMzRhZWY2MzBjZDZkYzgzYTM3MjNlNzdkMTg2YWZjMmY0ZjI0NWM3ZGMyODAwNzMyMjU5Mjk4MDhmZWMxYTlhNjVhNjU5YTZjYWJmZmM2MTA2YWZmYTZiNmMzNDcwZmM3NjIzOGZmYzZmOGZmMzliYjU2MzMwNDc0MDlmNDA2M2QxNGY0NzFlZDE3ZDNhNzdiYzI5MTM3NjE3NjZhOTUyMDVhN2RkYWE4Y2VjM2NmZDIxZGExM2UyYzFhMzYwMzRlYTlmNjVmMDdiZTMzOTI5Y2NhNzU1YTFhYzQ5M2Q5YTY0NTExNGM0NTlmNzg5ODg1NzI4Y2U2MDEwYTllMTZlODM2NGUxMzhkMDg4MzJhMzU4MmMxMjYxZmU0NzcxOGYyYTJmNjZmYWQ0MzI1NDBmMzg4YzZhZTA0OTc2NjJhNzUxOTA1ZjE1MmU1NGE3Mzg4M2YzMTI5NTlhMjg4NTVjYzNlMDVhZGZiY2IzMjkyNDI0MGZiOTM1ZWZiNjUxNjRkYTQ0M2UzYzk1MjViMDc1OTU0YTg5ZWI1MDNhZjRiZjNiYzcwODE0NzhhNzU2NGM0NDU4NzhhNzYwNTUxYTY3ZGZhMTlkZTRiZDFhNGIyODdmYTAyNTM4ZjhlYmVlMWM3"
}
},
"tbs_fingerprint": "c0c4cd7110a25a2671e2a7922f58b221d43284e56b02cb83515fde4c6cb05eaa",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2021-02-24T17:21:59",
"not_before": "2020-02-25T17:21:59"
}
},
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-04T17:02:07.291Z"
},
{
"port": 143,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Dovecot imapd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:dovecot:dovecot",
"part": "a",
"vendor": "dovecot",
"product": "dovecot",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"imap": {
"banner": "* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "EA8BB7D330F4213427D30D6650D7B021",
"fingerprint_sha1": "FB8D8216CF2C98A703103F69B1DFA40E130C6E31",
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"issuer": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"issuer_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "13290162889342297129",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"subject_alt_name": {
"dns_names": [
"w4u.pp.ua"
],
"extended_dns_names": [
{
"domain": "w4u",
"fld": "w4u.pp.ua",
"tld": "pp.ua"
}
]
},
"subject_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "24b195d029151a148e102e51530eadcf1a85587b00ff1fb0a6505b71b52b7f69",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "c0c4cd7110a25a2671e2a7922f58b221d43284e56b02cb83515fde4c6cb05eaa",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2021-02-24T17:21:59",
"not_before": "2020-02-25T17:21:59"
}
},
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-10-30T02:32:16.946Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "nginx",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:igor_sysoev:nginx",
"part": "a",
"vendor": "igor_sysoev",
"product": "nginx",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html><html lang=\"uk\"><head><meta charset=\"utf-8\"><meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0, user-scalable=0\"><meta name=\"author\" content=\"Web4u\"><meta name=\"csrf-param\" content=\"_csrf-frontend\"><meta name=\"csrf-token\" content=\"fdNNuNglY-c0-KeZxgTM2RxrV-8JTHairMSEgGkai18cpQDLonIm0ATB0dC_NfqYaC8IunoWKZHht_axBFPiLA==\"><link rel=\"shortcut icon\" href=\"/favicon.ico\"><title>Продажа систем видеонаблюдения, установка, гарантия, сервис</title><!-- Google Tag Manager --><script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start':\nnew Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0],\nj=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src=\n'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);\n})(window,document,'script','dataLayer','GTM-MWRPCGJ');</script><!-- End Google Tag Manager --><meta name=\"description\" content=\"відеонагляд Луцьк, відеонагляд Луцьк, видеонаблюдение, видеонаблюдение в Луцке, продажа камер видеонаблюдения, ip камер в Луцке. Установка системы видеонаблюдения в Луцке. Лучшее видеонаблюдение в Луцке и регионе. Подбор и установка видеонаблюдения для магазина, офиса, дома, дачи. Лучшие цены на камеры видеонаблюдения. Возможность установки камеры скрытого видеонаблюдения.\"><meta name=\"keywords\" content=\"відеонагляд Луцьк, видеонаблюдение, ip камера, камеры скрытого видеонаблюдения, камера ip, ip камеры, камеры скрытого видеонаблюдения беспроводные, камеры видеонаблюдения для магазина, відео, відеоспостереження, купить ip камеры для видеонаблюдения, цены на камеры видеонаблюдения, Луцк, відеонагляд Луцьк\"><link href=\"/minify/ac96163fea4a2854a9bdbefd2e5f10af1cfe6df0.css\" rel=\"stylesheet\"> <!-- Development Google Fonts --><link href='https://fonts.googleapis.com/css?family=Open+Sans:400,300,300italic,400italic,600,600italic,700italic,700,800,800italic%7CLato:400,100italic,100,300,300italic,400italic,700,700italic,900,900italic%7CRoboto:400,100,100italic,300,300italic,400italic,500,700,500italic,700italic,900,900italic'\nrel='stylesheet' type='text/css'><!-- Development Google Fonts --><meta name=\"facebook-domain-verification\" content=\"c7673lm2d4bamtde4vlmrd8sfkg1ay\" /></head><body style=\"background: url(/css/../img/home/presentation_background.jpg) no-repeat;width: 100%;\"><!-- Google Tag Manager (noscript) --><noscript><iframe src=\"https://www.googletagmanager.com/ns.html?id=GTM-MWRPCGJ\"\nheight=\"0\" width=\"0\" style=\"display:none;visibility:hidden\"></iframe></noscript><!-- End Google Tag Manager (noscript) --><!-- Search container --><div class=\"pm-search-container\" id=\"pm-search-container\"><!-- Search window --><div class=\"pm-search-columns\"><div class=\"container\"><div class=\"row\"><div class=\"col-lg-12 pm-center\"><p>Пошук по сайту</p></div></div><div class=\"row\"><div class=\"col-lg-12\"><div class=\"pm-search-box\"><i class=\"fa-search pm-search-submit\" id=\"pm-search-submit\"\nonclick=\"$(this).parent().find('form').submit();\"></i><form id=\"w1\" action=\"/search\" method=\"post\"><input type=\"hidden\" name=\"_csrf-frontend\" value=\"fdNNuNglY-c0-KeZxgTM2RxrV-8JTHairMSEgGkai18cpQDLonIm0ATB0dC_NfqYaC8IunoWKZHht_axBFPiLA==\"> <input type=\"text\" name=\"q\" autofocus minlength=\"3\" required\nplaceholder=\"Введіть запит...\"></form> </div></div></div><div class=\"row\"><div class=\"col-lg-12\"><i class=\"fa fa-times pm-search-exit\" id=\"pm-search-exit\"></i></div></div></div></div><!-- Search window end --></div><!-- Search container end --><div id=\"pm_layout_wrapper\" class=\"pm-full-mode\"><!-- Use wrapper for wide or boxed mode --><div class=\"pm-header-info\"><div class=\"container pm-header-info-container\"><div class=\"row\"><div class=\"col-lg-6 col-md-6 col-sm-4 col-xs-12\"><ul class=\"pm-header-support-ul\"><li><p class=\"pm-header-support-text\">Замовлення <a href=\"tel:380953378852\">+38 (095) 337-88-52</a>, <a href=\"tel:380971642878\">+38 (097)\n164-28-78</a></p></li></ul></div><div class=\"col-lg-6 col-md-6 col-sm-8 col-xs-12\"><div class=\"pm-header-buttons-spacer\"><ul class=\"pm-header-buttons-ul\"><li><p class=\"pm-header-login-text\">Почни уже сьогодні!</p></li><li><div class=\"pm-base-btn pm-header-btn pm-register-btn\"><a href=\"/register\">Реєстрація</a></div></li><li><div class=\"pm-base-btn pm-header-btn pm-login-btn\"><a href=\"/login\">Вхід</a></div></li><li><div class=\"pm-base-btn pm-header-btn search\" id=\"pm-search-btn\"><a class=\"fa fa-search\"></a></div></li></ul></div></div></div></div></div><!-- /pm-header-info --><header><div class=\"container pm-header-container\"><div class=\"row\"><div class=\"col-lg-3 col-md-3 col-sm-12 pm-header-logo-div\"><div class=\"pm-header-logo-container\"><a href=\"/\"><img src=\"/img/logo.png?v1\" class=\"img-responsive logo\" alt=\"CloudVision\"></a></div><div class=\"pm-header-mobile-btn-container\"><button type=\"button\" class=\"navbar-toggle pm-main-menu-btn\" id=\"pm-main-menu-btn\"\ndata-toggle=\"collapse\" data-target=\".navbar-collapse\"><i class=\"fa fa-bars\"></i></button></div></div><div class=\"col-lg-9 col-md-9 col-sm-12 pm-main-menu\"><nav class=\"navbar-collapse collapse\"><!-- superfish--><ul class=\"sf-menu\" id=\"pm-nav\"><li><a href=\"/\">Головна</a></li><li class=\"new\"><a href=\"/shop\">Магазин</a></li><li><a href=\"/about\">Про нас</a></li><li><a href=\"/news\">Новини</a></li><li><a href=\"/maps\">Географія CloudVision</a></li><li><a href=\"/contact\">Контакти</a></li><li><a href=\"/cart\">Корзина <span class=\"cart\">0</span></a></li></ul><!-- /superfish --></nav></div></div></div></header><!-- /header --><div class=\"pm-column-container pm-containerPadding-bottom-60 pm-containerPadding-top-60 pm-container-border index-box-about\"><div class=\"pm-column-container-icon\"><i class=\"fa fa-line-chart\"></i></div><div class=\"container pm-mobile-center\"><div class=\"row\"><div class=\"col-lg-12 col-md-12 col-sm-12\"><h2 class=\"text-center\">Три кроки до безпечного життя, або давай знайомитись?</h2><p class=\"text-center\">Ми підготували для вас короткий провідник по роботі з \"CloudVision\".</p><div class=\"row clearfix\"><div class=\"col-md-3 text-right\"><img src=\"../../img/ico-01.svg\" alt=\"Крок 1\" width=\"110\" /></div><div class=\"col-md-8\"><p class=\"fz18\"><strong>Крок 1.</strong> Заходьте на наш сайт чи сторінку у Facebook і шукайте там розділ \"Магазин\". Клікнувши на нього, ви потрапите у каталог відеообладнання. Ви можете підібрати щось самостійно, або звернутися за консультацією до наших спеціалістів, в онлайн режимі чи по телефону вони допоможуть обрати найбільш підходящий варіант камер для вас.</p></div></div><div class=\"row clearfix\"><div class=\"col-md-3 text-right\"><img src=\"../../img/ico-02.svg\" alt=\"Крок 2\" width=\"110\" /></div><div class=\"col-md-8\"><p class=\"fz18\"><strong>Крок 2.</strong> Коли ви визначилися із необхідними товарами, настав час знайомитися із представниками \"CloudVision\" наживо. Наші монтажники готові приїхати будь-коли і будь-куди. Ознайомившись із територією, спеціалісти визначать найбільш вигідне місце розташування для обладнання. І відразу після узгодження усіх нюансів з вами вони в швидко та надійно встановлять камери.</p></div></div><div class=\"row clearfix\"><div class=\"col-md-3 text-right\"><img src=\"../../img/ico-03.svg\" alt=\"Крок 3\" width=\"110\" /></div><div class=\"col-md-8\"><p class=\"fz18\"><strong>Крок 3.</strong> Для того, аби наша співпраця стала якомога більш плідною, скористайтеся онлайн-сервісом \"CloudVision\", що дозволяє зберігати терабайти вашого відеоархіву в так званій \"хмарі\". Це дозволить на 100% захистити ваші записи!</p></div></div> </div></div></div></div><!-- Workshop newsletter signup panel --><div class=\"pm-column-container pm-workshop-signup pm-containerPadding60 pm-container-border pm-center pm-parallax-panel\"\ndata-stellar-background-ratio=\"0.5\" data-stellar-vertical-offset=\"2000\"><div class=\"pm-column-container-icon\"><i class=\"fa fa-envelope\"></i></div><div class=\"container\"><div class=\"row\"><div class=\"col-lg-12\"><p class=\"pm-newsletter-form-text\">Хочете отримати консультацію? Залиште своє ім'я та телефон і ми вам перетелефонуємо</p><div class=\"pm-workshop-newsletter-form-container\"><form id=\"w0\" class=\"validate\" action=\"/\" method=\"post\"><input type=\"hidden\" name=\"_csrf-frontend\" value=\"fdNNuNglY-c0-KeZxgTM2RxrV-8JTHairMSEgGkai18cpQDLonIm0ATB0dC_NfqYaC8IunoWKZHht_axBFPiLA==\"><div class=\"form-group field-call-name required\"><input type=\"text\" id=\"call-name\" class=\"form-control\" name=\"Call[name]\" placeholder=\"Ваше ім'я\" aria-required=\"true\"><p class=\"help-block help-block-error\"></p></div><div class=\"form-group field-call-phone required\"><input type=\"text\" id=\"call-phone\" class=\"form-control\" name=\"Call[phone]\" placeholder=\"Телефон\" data-inputmask=\"'mask': '+38 (999) 999-99-99'\" aria-required=\"true\"><p class=\"help-block help-block-error\"></p></div> <button class=\"pm-workshop-newsletter-submit-btn\">Відправити</button></form> </div></div></div></div></div><!-- Workshop newsletter signup panel end --><div class=\"pm-column-container pm-containerPadding-bottom-80 pm-containerPadding-top-40 pm-container-border index-box-about2\"><div class=\"pm-column-container-icon\"><i class=\"fa fa-line-chart\"></i></div><div class=\"container pm-mobile-center\"><div class=\"row\"><div class=\"col-lg-4 col-md-4 col-sm-4\"><img src=\"/source/products/logo.png\" alt=\"CloudVision\"></div><div class=\"col-lg-7 col-md-7 col-sm-7\"><h2>Про систему CloudVision</h2><p>CloudVision – це абсолютно нова система відеонагляду в Україні. Ми не просто продаємо та ставимо камери, ми даруємо вам комфорт.</p><p>Наша команда докладає максимум зусиль для того, аби ви почувались захищеними завжди. Спектр наших послуг не обмежується монтажем систем відеонагляду: передусім кожному з вас ми індивідуально <a href=\"../../shop\">підбираємо обладнання</a>, розраховуємо вартість, узгоджуємо найменші деталі і лише тоді беремося до роботи. Крім традиційних послуг, ми пропонуємо вам скористатися сервісом CloudVision, що дозволяє зберігати терабайти ваших відеоархівів протягом певного часу. При цьому вам не потрібні жорсткі диски чи інші пристрої зберігання даних – відеозаписи будуть знаходитися під надійним захистом у так званій «хмарі».</p><p>І поки інші сидять і, втупившись в монітор, стежать за кожним рухом картинки, що транслюється з камер, ви насолоджуєтеся життям, а в разі необхідності отримуєте доступ до відеоархівів і переглядаєте потрібні фрагменти. Якщо ж ви звикли «тримати руку на пульсі», то наша система дозволить переглядати відео з камер відеонагляду цілодобово і в будь-якій точці світу (за умови наявності гаджета та інтернет-з’єднання).</p> </div></div></div></div><!-- BODY CONTENT starts here --><div class=\"pm-presentation-container pm-parallax-panel pm-container-border\" data-stellar-background-ratio=\"0.5\"\ndata-stellar-vertical-offset=\"97\"><div class=\"pm-column-container-icon\"><i class=\"fa fa-newspaper-o\"></i></div><div class=\"pm-presentation-text-container\"><div class=\"pm-presentation-text\"><h1>Новини</h1><p>Будьте в курсі передових технологій</p></div><ul class=\"pm-presentation-posts\" id=\"pm-presentation-owl\"><li><div class=\"pm-presentation-post-container\"><div class=\"pm-presentation-post-date\"><div class=\"pm-presentation-post-date-box\"><p class=\"pm-month\">ДЕК</p><p class=\"pm-day\">31</p></div></div><!-- /pm-presentation-post-date --><div class=\"pm-presentation-post-excerpt\"><p>Hikvision про те, яке глибоке машинне навчання вигідне у галузі безпеки</p></div><div class=\"pm-presentation-post-hover-container\"><p class=\"pm-presentation-post-hover-excerpt\">Пристрої зберігання даних в галузі безпеки регулярно потрібні для обробки величезної кількості та ба... <a href=\"/news/hikvision-pro-te-yake-gliboke-mashinne-navchannya-vigidne-u-galuzi-bezpeki\">[...]</a></p><a href=\"/news/hikvision-pro-te-yake-gliboke-mashinne-navchannya-vigidne-u-galuzi-bezpeki\">Детальніше »</a></div><div class=\"pm-presentation-post-img\"><img src=\"/source/products/hikvision-deep-learning-920.jpg\" width=\"475\" height=\"315\"\nalt=\"Hikvision про те, яке глибоке машинне навчання вигідне у галузі безпеки\"></div></div><!-- /pm-presentation-post-container --></li><li><div class=\"pm-presentation-post-container\"><div class=\"pm-presentation-post-date\"><div class=\"pm-presentation-post-date-box\"><p class=\"pm-month\">ДЕК</p><p class=\"pm-day\">26</p></div></div><!-- /pm-presentation-post-date --><div class=\"pm-presentation-post-excerpt\"><p>Технологія розпізнавання обличчя для покращення подорожей та банківської діяльності в 2018 році</p></div><div class=\"pm-presentation-post-hover-container\"><p class=\"pm-presentation-post-hover-excerpt\">\"У 2018 році почне працювати система розпізнавання обличь та інша біометрика, яка використовується в... <a href=\"/news/tehnologiya-rozpiznavannya-oblichchya-dlya-pokrashennya-podorozhej-ta-bankivs-koi-diyal-nosti-v-2018-roci\">[...]</a></p><a href=\"/news/tehnologiya-rozpiznavannya-oblichchya-dlya-pokrashennya-podorozhej-ta-bankivs-koi-diyal-nosti-v-2018-roci\">Детальніше »</a></div><div class=\"pm-presentation-post-img\"><img src=\"/source/products/facial-recognition-920.jpg\" width=\"475\" height=\"315\"\nalt=\"Технологія розпізнавання обличчя для покращення подорожей та банківської діяльності в 2018 році\"></div></div><!-- /pm-presentation-post-container --></li><li><div class=\"pm-presentation-post-container\"><div class=\"pm-presentation-post-date\"><div class=\"pm-presentation-post-date-box\"><p class=\"pm-month\">ДЕК</p><p class=\"pm-day\">21</p></div></div><!-- /pm-presentation-post-date --><div class=\"pm-presentation-post-excerpt\"><p>Компанія FLIR Systems, Inc. представляє ідентифікатор серії FB, найновішу відеокамеру безпеки серії FB-Series.</p></div><div class=\"pm-presentation-post-hover-container\"><p class=\"pm-presentation-post-hover-excerpt\">Компанія FLIR Systems, Inc. представляє ідентифікатор серії FB, найновішу відеокамеру безпеки серії ... <a href=\"/news/kompaniya-flir-systems-inc-predstavlyae-identifikator-serii-fb-najnovishu-videokameru-bezpeki-serii-fb-series\">[...]</a></p><a href=\"/news/kompaniya-flir-systems-inc-predstavlyae-identifikator-serii-fb-najnovishu-videokameru-bezpeki-serii-fb-series\">Детальніше »</a></div><div class=\"pm-presentation-post-img\"><img src=\"/source/products/FLIR-IP-bullet-camera-920x533-new.jpg\" width=\"475\" height=\"315\"\nalt=\"Компанія FLIR Systems, Inc. представляє ідентифікатор серії FB, найновішу відеокамеру безпеки серії FB-Series.\"></div></div><!-- /pm-presentation-post-container --></li><li><div class=\"pm-presentation-post-container\"><div class=\"pm-presentation-post-date\"><div class=\"pm-presentation-post-date-box\"><p class=\"pm-month\">ДЕК</p><p class=\"pm-day\">20</p></div></div><!-- /pm-presentation-post-date --><div class=\"pm-presentation-post-excerpt\"><p>VIVOTEK представляє нову багатофункціональну купольну мережеву камеру</p></div><div class=\"pm-presentation-post-hover-container\"><p class=\"pm-presentation-post-hover-excerpt\">Компанія VIVOTEK, світовий постачальник рішень для IP спостереження, оголосила про запуск своєї бага... <a href=\"/news/vivotek-predstavlyae-novu-bagatofunkcional-nu-kupol-nu-merezhevu-kameru\">[...]</a></p><a href=\"/news/vivotek-predstavlyae-novu-bagatofunkcional-nu-kupol-nu-merezhevu-kameru\">Детальніше »</a></div><div class=\"pm-presentation-post-img\"><img src=\"/source/products/ma8391-etv.png\" width=\"475\" height=\"315\"\nalt=\"VIVOTEK представляє нову багатофункціональну купольну мережеву камеру\"></div></div><!-- /pm-presentation-post-container --></li><li><div class=\"pm-presentation-post-container\"><div class=\"pm-presentation-post-date\"><div class=\"pm-presentation-post-date-box\"><p class=\"pm-month\">ДЕК</p><p class=\"pm-day\">19</p></div></div><!-- /pm-presentation-post-date --><div class=\"pm-presentation-post-excerpt\"><p>Відвідайте Dahua в Intersec 2018</p></div><div class=\"pm-presentation-post-hover-container\"><p class=\"pm-presentation-post-hover-excerpt\">Виставка \"Intersec 2018\" відбудеться з 21 по 23 січня 2018 року з виставковою площею 145 квадратних ... <a href=\"/news/vidvidajte-dahua-v-intersec-2018\">[...]</a></p><a href=\"/news/vidvidajte-dahua-v-intersec-2018\">Детальніше »</a></div><div class=\"pm-presentation-post-img\"><img src=\"/source/thumbnail.jpg\" width=\"475\" height=\"315\"\nalt=\"Відвідайте Dahua в Intersec 2018\"></div></div><!-- /pm-presentation-post-container --></li><li><div class=\"pm-presentation-post-container\"><div class=\"pm-presentation-post-date\"><div class=\"pm-presentation-post-date-box\"><p class=\"pm-month\">ДЕК</p><p class=\"pm-day\">17</p></div></div><!-- /pm-presentation-post-date --><div class=\"pm-presentation-post-excerpt\"><p>Європейський досвід: спеціалісти «CloudVision» пройшли успішне навчання закордоном</p></div><div class=\"pm-presentation-post-hover-container\"><p class=\"pm-presentation-post-hover-excerpt\">Спеціалісти «CloudVision» пройшли сертифікацію міжнародного рівня і готові запропонувати... <a href=\"/news/evropejs-kij-dosvid-specialisti-cloudvision-projshli-uspishne-navchannya-zakordonom\">[...]</a></p><a href=\"/news/evropejs-kij-dosvid-specialisti-cloudvision-projshli-uspishne-navchannya-zakordonom\">Детальніше »</a></div><div class=\"pm-presentation-post-img\"><img src=\"/source/IMG_2872.jpg\" width=\"475\" height=\"315\"\nalt=\"Європейський досвід: спеціалісти «CloudVision» пройшли успішне навчання закордоном\"></div></div><!-- /pm-presentation-post-container --></li></ul></div></div><!-- Services panels --><div class=\"pm-column-container pm-containerPadding60 pm-mobile-center\" style=\"background-color:#283e4e;\"><div class=\"container\"><div class=\"row\"><div class=\"col-lg-4 col-md-4 col-sm-4\"><div class=\"row\"><div class=\"col-lg-2 col-md-2 col-sm-3\"><img src=\"img/home/01_service_icon.png\" alt=\"icon1\"></div><div class=\"col-lg-10 col-md-10 col-sm-9\"><h4 class=\"pm-services-panel-title\">Власне програмне забезпечення</h4></div></div></div><div class=\"col-lg-4 col-md-4 col-sm-4\"><div class=\"row\"><div class=\"col-lg-2 col-md-2 col-sm-3\"><img src=\"img/home/02_service_icon.png\" alt=\"icon2\"></div><div class=\"col-lg-10 col-md-10 col-sm-9\"><h4 class=\"pm-services-panel-title\">Онлайн-доступ</h4></div></div></div><div class=\"col-lg-4 col-md-4 col-sm-4\"><div class=\"row\"><div class=\"col-lg-2 col-md-2 col-sm-3\"><img src=\"img/home/03_service_icon.png\" alt=\"icon3\"></div><div class=\"col-lg-10 col-md-10 col-sm-9\"><h4 class=\"pm-services-panel-title\">Тривале збереження архіву відео</h4></div></div></div></div></div></div><!-- /Services panels --><!-- Intro Panel --><div class=\"pm-column-container pm-containerPadding-bottom-80 pm-containerPadding-top-120 pm-container-border\"><div class=\"pm-column-container-icon\"><i class=\"fa fa-users\"></i></div><div class=\"container pm-mobile-center\"><div class=\"row\"><div class=\"col-lg-5 col-md-5 col-sm-5\"><div class=\"row\"><div class=\"col-lg-4 col-md-4 col-sm-4 col-xs-12\"><div class=\"pm-statistic-box-container wow fadeInUp animated\" data-wow-delay=\"0.2s\"\ndata-wow-offset=\"50\" data-wow-duration=\"1s\"><h3>55%</h3><p>клієнтів порадили нас знайомим</p><img src=\"img/home/man-icon.png\" class=\"img-responsive\"\nalt=\"reduction in development costs\"></div></div><div class=\"col-lg-4 col-md-4 col-sm-4 col-xs-12\"><div class=\"pm-statistic-box-container offset wow fadeInUp animated\" data-wow-delay=\"0.4s\"\ndata-wow-offset=\"50\" data-wow-duration=\"1s\"><h3>72%</h3><p>клієнтів оформляють підтримку</p><img src=\"img/home/man-icon.png\" class=\"img-responsive\" alt=\"increase in quality assurance\"></div></div><div class=\"col-lg-4 col-md-4 col-sm-4 col-xs-12\"><div class=\"pm-statistic-box-container wow fadeInUp animated\" data-wow-delay=\"0.6s\"\ndata-wow-offset=\"50\" data-wow-duration=\"1s\"><h3>90%</h3><p>задоволені нашою роботою</p><img src=\"img/home/man-icon.png\" class=\"img-responsive\" alt=\"increase in development time\"></div></div></div></div><div class=\"col-lg-7 col-md-7 col-sm-7\"><h2>Як зрозуміти, що вам потрібний відеонагляд?</h2><p>Щодня зростає популярність застосування систем відеоспостереження. Сьогоднішній ринок пропонує\nунікальні зразки апаратури з можливостями, які ще вчора вважалися фантастичними. Вже традиційно для\nохорони великого об'єкту застосовується установка камер відеоспостереження по периметру і на\nоперативно небезпечних напрямках.</p><p>Зростання злочинності і не цілком адекватна поведінка співгромадян сприяють розширенню сфери\nзастосування контролюючого обладнання. Актуальним стає організація відеоспостереженняспостереження\nза подіями на прилеглій території.</p><p>Системи відеоспостереження - сьогодні найефективніший технічний засіб забезпечення безпеки, що\nдозволяє оперативно зафіксувати факт скоєння тієї чи іншої протиправного дії, а також дає можливість\nконтролювати якість роботи співробітників, загальну ситуацію на об'єкті.</p><div class=\"pm-rounded-btn\"><a href=\"#upcoming-workshops\"\nclass=\"pm-page-scroll\">Вибрати послугу <i\nclass=\"fa fa-chevron-down\"></i></a></div></div></div></div></div><!-- Workshops panel --><div class=\"pm-column-container pm-containerPadding-bottom-80 pm-center\"><div class=\"container\"><div class=\"row\"><div class=\"col-lg-12\"><h4><a id=\"upcoming-workshops\">Популярні послуги</a></h4><h5><a href=\"/register\">Реєструйтеся</a> та користуйтеся нашими перевагами </h5></div><div class=\"col-lg-6 col-md-6 col-sm-6 pm-containerPadding30\"><div class=\"pm-workshop-post-container\"><div class=\"pm-workshop-post-title-container\"><p class=\"pm-workshop-post-title\">Light</p><p class=\"pm-workshop-post-subtitle\">Термін зберігання - 5 днів, якість відео - HD</p></div><div class=\"pm-workshop-post-date-container\"><div class=\"pm-workshop-post-icon\"><i class=\"fa fa-lightbulb-o\"></i></div><p class=\"pm-title\">Кількість камер: 1-3</p><p class=\"pm-date\">Ціна: 150-250 грн/міс</p></div><a href=\"javascript:void(0);\"\nonclick=\"$(this).next().slideToggle();$(this).find('i').toggleClass('.fa-angle-down')\"\nclass=\"pm-workshop-post-button-container\"><p>Детальніше</p><i class=\"fa fa-angle-right\"></i></a><div class=\"more-text\">\nякість відео HD 1МП (1280x960). Термін зберігання відео у Хмарі 5 діб </div></div></div><div class=\"col-lg-6 col-md-6 col-sm-6 pm-containerPadding30\"><div class=\"pm-workshop-post-container\"><div class=\"pm-workshop-post-title-container\"><p class=\"pm-workshop-post-title\">Standart</p><p class=\"pm-workshop-post-subtitle\">Термін зберігання - 10 днів, якість відео - HD</p></div><div class=\"pm-workshop-post-date-container\"><div class=\"pm-workshop-post-icon\"><i class=\"fa fa-hourglass-start\"></i></div><p class=\"pm-title\">Кількість камер: 1-3</p><p class=\"pm-date\">Ціна: 200-400 грн/міс</p></div><a href=\"javascript:void(0);\"\nonclick=\"$(this).next().slideToggle();$(this).find('i').toggleClass('.fa-angle-down')\"\nclass=\"pm-workshop-post-button-container\"><p>Детальніше</p><i class=\"fa fa-angle-right\"></i></a><div class=\"more-text\">\nякість відео HD 1МП (1280x960). Термін зберігання відео у Хмарі 10 діб </div></div></div><div class=\"clearfix\"></div> <div class=\"col-lg-6 col-md-6 col-sm-6 pm-containerPadding30\"><div class=\"pm-workshop-post-container\"><div class=\"pm-workshop-post-title-container\"><p class=\"pm-workshop-post-title\">Medium</p><p class=\"pm-workshop-post-subtitle\">Термін зберігання - 5 днів, якість відео - FullHD</p></div><div class=\"pm-workshop-post-date-container\"><div class=\"pm-workshop-post-icon\"><i class=\"fa fa-medium\"></i></div><p class=\"pm-title\">Кількість камер: 1-3</p><p class=\"pm-date\">Ціна: 200-400 грн/міс</p></div><a href=\"javascript:void(0);\"\nonclick=\"$(this).next().slideToggle();$(this).find('i').toggleClass('.fa-angle-down')\"\nclass=\"pm-workshop-post-button-container\"><p>Детальніше</p><i class=\"fa fa-angle-right\"></i></a><div class=\"more-text\">\nякість відео FullHD 2МП (1920×1080). Термін зберігання відео у Хмарі 5 діб </div></div></div><div class=\"col-lg-6 col-md-6 col-sm-6 pm-containerPadding30\"><div class=\"pm-workshop-post-container\"><div class=\"pm-workshop-post-title-container\"><p class=\"pm-workshop-post-title\">Premium</p><p class=\"pm-workshop-post-subtitle\">Термін зберігання - 10 днів, якість відео - FullHD</p></div><div class=\"pm-workshop-post-date-container\"><div class=\"pm-workshop-post-icon\"><i class=\"fa fa-star\"></i></div><p class=\"pm-title\">Кількість камер: 1-3</p><p class=\"pm-date\">Ціна: 300-500 грн/міс</p></div><a href=\"javascript:void(0);\"\nonclick=\"$(this).next().slideToggle();$(this).find('i').toggleClass('.fa-angle-down')\"\nclass=\"pm-workshop-post-button-container\"><p>Детальніше</p><i class=\"fa fa-angle-right\"></i></a><div class=\"more-text\">\nякість відео FullHD 2МП (1920×1080). Термін зберігання відео у Хмарі 10 діб </div></div></div><div class=\"clearfix\"></div> </div><div>\n* Ціни вказано за користування сервісом. Обладнання та вставлення вираховується індивідуально для замовника. </div><div>\n** Якщо кількість камер більша 3х - вартість користування сервісом вираховується індивідуально</div></div></div><!-- Workshops panel end --><div class=\"pm-column-container pm-containerPadding80 pm-container-border pm-center pm-statistics-panel pm-parallax-panel\"\ndata-stellar-background-ratio=\"0.5\" data-stellar-vertical-offset=\"1000\"><div class=\"pm-column-container-icon\"><i class=\"fa fa-share-alt\"></i></div><div class=\"container\"><div class=\"row\"><div class=\"col-lg-12 col-md-12 col-sm-12\"><div class=\"pm-cta-container\"><div class=\"pm-cta-divider\"></div><p class=\"pm-cta-text\">Наші персональні досягнення</p><div class=\"pm-cta-divider\"></div></div></div></div><div class=\"row\"><div class=\"col-lg-3 col-md-3 col-sm-6\"><!-- statistic box --><div class=\"pm-statistic-box wow fadeInUp animated\" data-wow-delay=\"0.2s\" data-wow-offset=\"50\"\ndata-wow-duration=\"1s\"><div class=\"pm-statistic-box-triangle\"><p class=\"pm-statistic-text1\">3</p><p class=\"pm-statistic-text2\">роки</p></div><div class=\"pm-statistic-box-desc\"><p>у сфері відеонагляду</p></div></div><!-- /statistic box --></div><div class=\"col-lg-3 col-md-3 col-sm-6\"><!-- statistic box --><div class=\"pm-statistic-box wow fadeInUp animated\" data-wow-delay=\"0.4s\" data-wow-offset=\"50\"\ndata-wow-duration=\"1s\"><div class=\"pm-statistic-box-triangle\"><p class=\"pm-statistic-text1\">82</p><p class=\"pm-statistic-text2\">замовники</p></div><div class=\"pm-statistic-box-desc\"><p>залишилися задоволеними нашою роботою</p></div></div><!-- /statistic box --></div><div class=\"col-lg-3 col-md-3 col-sm-6\"><!-- statistic box --><div class=\"pm-statistic-box wow fadeInUp animated\" data-wow-delay=\"0.6s\" data-wow-offset=\"50\"\ndata-wow-duration=\"1s\"><div class=\"pm-statistic-box-triangle\"><p class=\"pm-statistic-text1\">500</p><p class=\"pm-statistic-text2\">годин</p></div><div class=\"pm-statistic-box-desc\"><p>витрачено на вдосконалення програмного забезпечення</p></div></div><!-- /statistic box --></div><div class=\"col-lg-3 col-md-3 col-sm-6\"><!-- statistic box --><div class=\"pm-statistic-box wow fadeInUp animated\" data-wow-delay=\"0.8s\" data-wow-offset=\"50\"\ndata-wow-duration=\"1s\"><div class=\"pm-statistic-box-triangle\"><p class=\"pm-statistic-text1\">10</p><p class=\"pm-statistic-text2\">послуг</p></div><div class=\"pm-statistic-box-desc\"><p>з яких, кожен може обрати необхідну для себе</p></div></div><!-- /statistic box --></div></div></div></div><!-- Partners carousel --><div class=\"pm-column-container pm-containerPadding80\"><div class=\"container\"><div class=\"row\"><div class=\"col-lg-12\"><h3 class=\"pm-center\">Наші партнери</h3><ul class=\"pm-partners-carousel-posts\" id=\"pm-partners-carousel-owl\"><li><div class=\"pm-parnters-post-container\"><img src=\"img/hikvision_logo.png\" class=\"img-responsive\" style=\"width: 240px\"\nalt=\"hikvision\"></div></li><li><div class=\"pm-parnters-post-container\"><img src=\"/source/partners/logo_300dpi.jpg\" style=\"width: 240px\" class=\"img-responsive\"\nalt=\"Hetzner\"></div></li><li><div class=\"pm-parnters-post-container\"><img src=\"/img/CN66756LOGO.jpeg\" style=\"width: 160px\" class=\"img-responsive\"\nalt=\"hikvision\"></div></li><li><div class=\"pm-parnters-post-container\"><img src=\"/img/logo_green.png\" style=\"width: 240px\" class=\"img-responsive\"\nalt=\"GreenVision\"></div></li><li><div class=\"pm-parnters-post-container\"><img src=\"/img/bcs_logo.png\" style=\"width: 160px\" class=\"img-responsive\" alt=\"BCS\"></div></li><li><div class=\"pm-parnters-post-container\"><a href=\"http://rucat.org/\" target=\"_blank\"><img src=\"/source/partners/rucat.png\"\nstyle=\"width: 160px\" class=\"img-responsive\"\nalt=\"Rucat.org\"></a></div></li><li><div class=\"pm-parnters-post-container\"><img src=\"data:image/png;base64,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\"\nclass=\"img-responsive\" alt=\"hikvision\"></div></li></ul></div></div></div></div><div class=\"pm-fat-footer\"><div class=\"container\"><div class=\"row\"><div class=\"col-lg-12 col-md-12 col-sm-12 pm-widget-footer text-center\"><img src=\"/img/logo.png?v1\" width=\"220\" alt=\"Image\" height=\"100\"><p>Надійні системи відеонагляду</p></div></div></div></div><footer><div class=\"container\"><div class=\"row\"><div class=\"col-lg-6 col-md-6 col-sm-6\"><div class=\"pm-footer-social-info-container\"><h6>Приєднуйтеся до нас</h6><ul class=\"pm-footer-social-icons\"><li title=\"Twitter\" class=\"pm_tip_static_top\"><a href=\"https://twitter.com/CloudVision_ua\"\ntarget=\"_blank\"><i\nclass=\"fa fa-twitter tw\"></i></a></li><li title=\"Facebook\" class=\"pm_tip_static_top\"><a\nhref=\"https://www.facebook.com/CloudVision\" target=\"_blank\"><i\nclass=\"fa fa-facebook fb\"></i></a></li><li title=\"Google Plus\" class=\"pm_tip_static_top\"><a\nhref=\"https://plus.google.com/u/3/111912111585819274025\" target=\"_blank\"><i\nclass=\"fa fa-google-plus gp\"></i></a></li></ul></div></div><div class=\"col-lg-6 col-md-6 col-sm-6\"><div class=\"pm-footer-subscribe-container\"><h6>Підписатися на новини</h6><div class=\"pm-footer-subscribe-form-container\"><form id=\"w2\" action=\"/site/subscribe\" method=\"post\"><input type=\"hidden\" name=\"_csrf-frontend\" value=\"fdNNuNglY-c0-KeZxgTM2RxrV-8JTHairMSEgGkai18cpQDLonIm0ATB0dC_NfqYaC8IunoWKZHht_axBFPiLA==\"> <input class=\"pm-footer-subscribe-field\" type=\"text\" placeholder=\"Email\"\ndata-inputmask-regex=\"^[0-9a-zA-Z]+@[0-9a-zA-Z]+$\" required name=\"email\" value=\"\"/><div class=\"pm-footer-subscribe-submit-btn\" onclick=\"$(this).closest('form').submit();\"><i class=\"fa fa-paper-plane\"></i></div></form> </div></div></div></div></div></footer><div class=\"pm-footer-copyright\"><div class=\"container\"><div class=\"row\"><div class=\"col-lg-5 col-md-5 col-sm-12 pm-footer-copyright-col\"><p>©2012-2025 cloudvision.com.ua. Розробка <a\nhref=\"https://web4u.in.ua/\" target=\"_blank\">Web4U</a></p></div><div class=\"col-lg-7 col-md-7 col-sm-12 pm-footer-navigation-col\"><ul class=\"pm-footer-navigation\" id=\"pm-footer-nav\"><li><a href=\"/politycs\">Політика конфіденційності</a></li><li><a href=\"/about\">Про нас</a></li><li><a href=\"/news\">Новини</a></li><li><a href=\"/contact\">Контакти</a></li></ul></div></div></div></div></div><!-- /pm_layout-wrapper --><div class=\"label-x-chat\"></div><div class=\"box-x-chat\"><div class=\"head\"><i class=\"fa fa-comment\"></i>\nДопомога <i class=\"fa fa-times-circle\"></i></div><div class=\"body\" id=\"result-sms\"><div class=\"tex-info\">Доброго дня!<br/> Очікуйте підключення оператора...</div></div><div class=\"foot\"><textarea rows=\"3\"></textarea><i class=\"fa fa-paper-plane\" id=\"send-chat-sms\"></i></div></div><script src=\"//ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js\"></script><script src=\"/minify/4ad45e77a28d5af9e9302a64242ef8b6f590fc40.js\"></script><script src=\"//maps.googleapis.com/maps/api/js?key=AIzaSyBsBxH7Lu3-agjC_EH3YjSsEdc2e9ni5MQ&language=uk\"></script><script src=\"/minify/34e6a1d9fa3e350e6ab01e164748ab021e214669.js\"></script><script>jQuery(function ($) {\njQuery('#w0').yiiActiveForm([{\"id\":\"call-name\",\"name\":\"name\",\"container\":\".field-call-name\",\"input\":\"#call-name\",\"error\":\".help-block.help-block-error\",\"validate\":function (attribute, value, messages, deferred, $form) {yii.validation.required(value, messages, {\"message\":\"Поле \\\"Імя\\\" не може бути пустим\"});}},{\"id\":\"call-phone\",\"name\":\"phone\",\"container\":\".field-call-phone\",\"input\":\"#call-phone\",\"error\":\".help-block.help-block-error\",\"validate\":function (attribute, value, messages, deferred, $form) {yii.validation.required(value, messages, {\"message\":\"Поле \\\"Телефон\\\" не може бути пустим\"});}}], []);\njQuery('#w1').yiiActiveForm([], []);\njQuery('#w2').yiiActiveForm([], []);\n});</script><p id=\"back-top\" class=\"visible-lg visible-md visible-sm\"></p></body></html>",
"body_murmur": -1097607695,
"body_sha256": "952bd61e88a74c94c27bb952e706fc4160b2e23ab27b02def31a6f9a64b6ed6a",
"component": [
"Google Tag Manager",
"Nginx"
],
"content_length": -1,
"headers": {
"cache_control": [
"no-store, no-cache, must-revalidate"
],
"connection": [
"keep-alive"
],
"content_type": [
"text/html; charset=UTF-8"
],
"date": [
"Fri, 07 Nov 2025 20:14:01 GMT"
],
"expires": [
"Thu, 19 Nov 1981 08:52:00 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"nginx"
],
"set_cookie": [
"PHPSESSID=jlhu6hemsecmaaromt1l5n9k3q; path=/; HttpOnly",
"_csrf-frontend=4ac7b845cffaa1cc57ab711aefc1c24be5c3c626d5ae1e99ae507d4444320cdda%3A2%3A%7Bi%3A0%3Bs%3A14%3A%22_csrf-frontend%22%3Bi%3A1%3Bs%3A32%3A%22avMszWE709vIy16AtD_UsZ_3Msr1mIis%22%3B%7D; path=/; HttpOnly; SameSite=Lax"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=60"
]
}
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "176.9.100.173",
"path": "",
"scheme": "https"
}
},
"status_code": 200,
"title": "Продажа систем видеонаблюдения, установка, гарантия, сервис",
"transfer_encoding": [
"chunked"
]
},
"tls": {
"certificate": {
"extensions": {
"authority_info_access": {
"issuer_urls": [
"http://e6.i.lencr.org/"
],
"ocsp_urls": [
"http://e6.o.lencr.org"
]
},
"authority_key_id": "9327469803a951688e98d6c44248db23bf5894d2",
"basic_constraints": {
"is_ca": true
},
"certificate_policies": [
{
"id": "2.23.140.1.2.1"
}
],
"ct_precert_scts": "Signed Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : A2:E3:0A:E4:45:EF:BD:AD:9B:7E:38:ED:47:67:77:53:\n D7:82:5B:84:94:D7:2B:5E:1B:2C:C4:B9:50:A4:47:E7\n Timestamp : Dec 23 09:55:28.325 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:45:02:20:4C:BC:4A:67:85:02:E7:CE:D5:18:1E:C3:\n 4F:56:27:9F:46:04:B9:22:95:7F:6A:17:04:74:1B:1F:\n 22:C3:CA:AF:02:21:00:C9:B8:53:79:05:20:4C:E5:B2:\n BB:C2:43:B9:9E:4D:B3:5D:45:56:B1:95:91:DD:52:F0:\n 5E:A1:28:30:C6:86:27\nSigned Certificate Timestamp:\n Version : v1 (0x0)\n Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:\n 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF\n Timestamp : Dec 23 09:55:28.324 2024 GMT\n Extensions: none\n Signature : ecdsa-with-SHA256\n 30:43:02:1F:14:5C:7A:09:99:A9:7F:6D:ED:AE:CA:01:\n 03:0B:0F:06:E9:23:A7:FA:7A:C2:40:B9:59:82:8B:F3:\n F6:53:2C:02:20:7E:3F:AC:F3:3A:24:36:E2:79:2C:C8:\n 59:69:84:EE:74:65:40:E7:98:E1:1A:B3:0D:18:A2:D9:\n 8E:C5:A5:B6:4E",
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": true,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": false
},
"subject_alt_name": {
"dns_names": [
"cloudvision.com.ua"
]
},
"subject_key_id": "671be52c6243ff4a838e994cfdf44bab6b0fd6fe"
},
"fingerprint_md5": "2C212FCC18FF47243E35D4349DD9218D",
"fingerprint_sha1": "BD979248564A016B1955AC6755AB139249DB7388",
"fingerprint_sha256": "D6B091BD41EE75F67336191978FB6F69A50AEAEBF16357CE98310324EA27D42C",
"issuer": {
"common_name": [
"E6"
],
"country": [
"US"
],
"organization": [
"Let's Encrypt"
]
},
"issuer_dn": "/C=US/O=Let's Encrypt/CN=E6",
"jarm": "28d28d28d00028d1ec28d28d28d28d3446fb8839649f251e5083970c44ad30",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "348002172736512202144912618407810164371928",
"signature": {
"algorithm": {
"name": "ecdsa-with-SHA384",
"oid": "1.2.840.10045.4.3.3"
},
"self_signed": false,
"value": "MzA2NDAyMzA2ZTVlZDVhYTFiMDZhNzZhNDdmNGQ5MDY0MDdkM2M0NTZjNWI0YzU1ODg2YWFiN2JhNzFjYzg1NTAxMzJlMDY1NWEyN2RjZjk2NDhhOTVkMGU5MGIxY2ZiN2U3ZmUzNDQwMjMwMmJmNWFkNjI5ZjY4NzZjZDE2MzU4ZTRiZjkyZmJhMWJlNDc1NjJjYzYwZjU1ODg3YzcwYThkNjAyNmRmNmI2ZTMyYmJmNTNjYzAxMzY5OWFmOTI0MDA5MmJkNTU0Zjhk"
},
"signed_certificate_timestamps": [
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "a2e30ae445efbdad9b7e38ed47677753d7825b8494d72b5e1b2cc4b950a447e7",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "304502204cbc4a678502e7ced5181ec34f56279f4604b922957f6a1704741b1f22c3caaf022100c9b8537905204ce5b2bbc243b99e4db35d4556b19591dd52f05ea12830c68627"
},
"timestamp": "2024-12-23T09:55:28.325000",
"version": "v1"
},
{
"entry_type": "PRE_CERTIFICATE",
"log_id": "4e75a3275c9a10c3385b6cd4df3f52eb1df0e08e1b8d69c0b1fa64b1629a39df",
"signature": {
"algorithm": "ECDSA",
"hash_algorithm": "SHA256",
"value": "3043021f145c7a0999a97f6dedaeca01030b0f06e923a7fa7ac240b959828bf3f6532c02207e3facf33a2436e2792cc8596984ee746540e798e11ab30d18a2d98ec5a5b64e"
},
"timestamp": "2024-12-23T09:55:28.324000",
"version": "v1"
}
],
"signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
"subject": {
"common_name": [
"cloudvision.com.ua"
]
},
"subject_alt_name": {
"dns_names": [
"cloudvision.com.ua"
],
"extended_dns_names": [
{
"domain": "cloudvision",
"fld": "cloudvision.com.ua",
"tld": "com.ua"
}
]
},
"subject_dn": "/CN=cloudvision.com.ua",
"subject_key_info": {
"_key": "ecdsa",
"dh": [],
"dsa": [],
"ecdsa": {
"b": "\"Zc65d8aa:93e7b3ebbdUv9886bce1d06b0ccSb0f6;ce<>'d2`K\"",
"curve": "p256",
"gx": "k17d1f2e1,BGf8bce6e5ca4@f2w03}81-eb3a0f4a19Ed898c296",
"gy": "Oe3Be2fe1a7f9b8ee7ebJ|0f9e16+ce3Wk1^cecbb6@h7bfQf5",
"length": 256,
"p": "ffffffff00000001000000000000000000000000ffffffffffffffffffffffff",
"x": "83269986957662438363573513788649181919629458842743741234589411021180339343387",
"y": "57184758484823115547500811338101981343617995839228034171352814436442502673558"
},
"fingerprint_sha256": "e3f4f4139aed73b1b26fe76fb54d2843b7bc25611c4031f079bf999149d28bd2",
"key_algorithm": "Elliptic_curve_cryptography",
"rsa": []
},
"tbs_fingerprint": "c7fb7b0807796b7e570ee7f2cdbea074558e2a282a3f430121cc6fc7bbe5421f",
"tbs_noct_fingerprint": "b171f14493c85f2006f014c9c5348fe870faeab1559df4e0d44ae5383cfe1451",
"validation_level": "DV",
"validity": {
"length_seconds": 7775999,
"not_after": "2025-03-23T08:56:57",
"not_before": "2024-12-23T08:56:58"
},
"version": 2
},
"fingerprint_sha256": "D6B091BD41EE75F67336191978FB6F69A50AEAEBF16357CE98310324EA27D42C",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"url": "https://176.9.100.173/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-07T20:14:03.168Z"
},
{
"port": 465,
"protocol": "tcp",
"name": "smtp",
"version": "4.89",
"product": "Exim smtpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:exim:exim:4.89",
"part": "a",
"vendor": "exim",
"product": "exim",
"version": "4\\.89",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"cve": [
{
"id": "CVE-2017-1000369",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2017-16943",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2017-16944",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-05T10:48:35.935Z"
},
{
"port": 587,
"protocol": "tcp",
"name": "smtp",
"version": "4.89",
"product": "Exim smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:exim:exim:4.89",
"part": "a",
"vendor": "exim",
"product": "exim",
"version": "4\\.89",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 w4u.pp.ua ESMTP Exim 4.89 Thu, 06 Nov 2025 16:39:30 +0200\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "EA8BB7D330F4213427D30D6650D7B021",
"fingerprint_sha1": "FB8D8216CF2C98A703103F69B1DFA40E130C6E31",
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"issuer": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"issuer_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "13290162889342297129",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"subject_alt_name": {
"dns_names": [
"w4u.pp.ua"
],
"extended_dns_names": [
{
"domain": "w4u",
"fld": "w4u.pp.ua",
"tld": "pp.ua"
}
]
},
"subject_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "24b195d029151a148e102e51530eadcf1a85587b00ff1fb0a6505b71b52b7f69",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "c0c4cd7110a25a2671e2a7922f58b221d43284e56b02cb83515fde4c6cb05eaa",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2021-02-24T17:21:59",
"not_before": "2020-02-25T17:21:59"
}
},
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"precert": false,
"raw": "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",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2017-1000369",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2017-16943",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2017-16944",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-07T02:33:39.118Z"
},
{
"port": 993,
"protocol": "tcp",
"name": "imap",
"version": "",
"product": "Dovecot imapd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:dovecot:dovecot",
"part": "a",
"vendor": "dovecot",
"product": "dovecot",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-05T18:37:15.966Z"
},
{
"port": 995,
"protocol": "tcp",
"name": "pop3",
"version": "",
"product": "Dovecot pop3d",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:dovecot:dovecot",
"part": "a",
"vendor": "dovecot",
"product": "dovecot",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-10-29T03:57:22.468Z"
},
{
"port": 2525,
"protocol": "tcp",
"name": "smtp",
"version": "4.89",
"product": "Exim smtpd",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:exim:exim:4.89",
"part": "a",
"vendor": "exim",
"product": "exim",
"version": "4\\.89",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"smtp": {
"banner": "220 w4u.pp.ua ESMTP Exim 4.89 Thu, 06 Nov 2025 07:38:35 +0200\r\n"
},
"tls": {
"certificate": {
"fingerprint_md5": "EA8BB7D330F4213427D30D6650D7B021",
"fingerprint_sha1": "FB8D8216CF2C98A703103F69B1DFA40E130C6E31",
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"issuer": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"issuer_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "13290162889342297129",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"w4u.pp.ua"
],
"country": [
"US"
],
"email_address": [
"[email protected]"
],
"locality": [
"San Francisco"
],
"organization": [
"Vesta Control Panel"
],
"organizational_unit": [
"IT"
],
"province": [
"California"
]
},
"subject_alt_name": {
"dns_names": [
"w4u.pp.ua"
],
"extended_dns_names": [
{
"domain": "w4u",
"fld": "w4u.pp.ua",
"tld": "pp.ua"
}
]
},
"subject_dn": "/C=US/ST=California/L=San Francisco/O=Vesta Control Panel/OU=IT/CN=w4u.pp.ua/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "24b195d029151a148e102e51530eadcf1a85587b00ff1fb0a6505b71b52b7f69",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "c0c4cd7110a25a2671e2a7922f58b221d43284e56b02cb83515fde4c6cb05eaa",
"validation_level": "OV",
"validity": {
"length_seconds": 31536000,
"not_after": "2021-02-24T17:21:59",
"not_before": "2020-02-25T17:21:59"
}
},
"fingerprint_sha256": "EC42A892B3E997F3813595B1638A06380AC4E4AE24CEB3D1BFB800B6FBE72BD2",
"precert": false,
"raw": "MIIFtDCCA5wCCQC4cCS7ylOkKTANBgkqhkiG9w0BAQsFADCBmzELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xHDAaBgNVBAoME1Zlc3RhIENvbnRyb2wgUGFuZWwxCzAJBgNVBAsMAklUMRIwEAYDVQQDDAl3NHUucHAudWExIDAeBgkqhkiG9w0BCQEWEWFkbWluQHdlYjR1LmluLnVhMB4XDTIwMDIyNTE3MjE1OVoXDTIxMDIyNDE3MjE1OVowgZsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlhMRYwFAYDVQQHDA1TYW4gRnJhbmNpc2NvMRwwGgYDVQQKDBNWZXN0YSBDb250cm9sIFBhbmVsMQswCQYDVQQLDAJJVDESMBAGA1UEAwwJdzR1LnBwLnVhMSAwHgYJKoZIhvcNAQkBFhFhZG1pbkB3ZWI0dS5pbi51YTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOQQ6bRUDdXLjLGNsLy9bms9rjD9tQD8jsiVZsEYmsCFxVCmi0RkpECv3U8c+f0tZe+xUy19K4sUdWWaRezk+LJdDSaXKxlccqUgudbfqvbSFaZrlNoVV+WiAHahgxl2DCrlDSsmxU/EHMlKdTXZQwJmAKg2EIgOQQt53gyTGZYhemsppAA862dA4hbO3DAiwv94D2HDEjA84x7p6UJ+cj5tTKFLbhvcP7mk+KTsI+MpdtVdYgYjBCT4tkSBttUJHtpSIbjplTuIdHOvq3/7a3eaWa6C9ml0wVUa/KETExAHeyz+KBmWIN0ZQDuUB9wqtJV0+bvH8Xud0Ck7KNpjWRSbgeHAPgk89/zVR1nbP4WtNK72MM1tyDo3I+d9GGr8L08kXH3CgAcyJZKYCP7BqaZaZZpsq//GEGr/prbDRw/HYjj/xvj/ObtWMwR0CfQGPRT0ce0X06d7wpE3YXZqlSBafdqozsPP0h2hPiwaNgNOqfZfB74zkpzKdVoaxJPZpkURTEWfeJiFcozmAQqeFug2ThONCIMqNYLBJh/kdxjyovZvrUMlQPOIxq4El2YqdRkF8VLlSnOIPzEpWaKIVcw+Ba37yzKSQkD7k177ZRZNpEPjyVJbB1lUqJ61A69L87xwgUeKdWTERYeKdgVRpn36Gd5L0aSyh/oCU4+OvuHHAgMBAAEwDQYJKoZIhvcNAQELBQADggIBAKVuDhrKl6Hy0OsvU/ykjN49xzVQVRg5EEMlhdmXULo/q0P6me95+SgToP6Nx9J250StwgU51TSNBl7nc1FBylfzrhdHIvadtOztFe3ckJGSI1/Oe9mYRt2HIK0NTkEkGsHa2b4qeu2xY4iOROhPqLGmo4roSzKNf7bDGIXVTsiDTwaR/TTAbqZcBH6XrkJtjMud/WeN3JMIgTer7dfHXvMr5qZM1cHvf6cnViXtcHXQv3ZAEJvj9cfzffCqiGKd2t4+sIG7Y5+5r6Jn65KfQXWTT80FQrfyIWqF7+/qgSycNJAgzmAKdRzVoj0CcFCsYMN4CvdADdhwMqhObg9zG0ex9Dbz3CPmsT6Gcw5GfSW9PnpEric5nVSGAT5fOaqDup+Y5ePEVIAHMWfVuEI4YIUMhVUlOmkqdQ2KaiTkltIvftR236Vo74xJ2z14kf8WXz6NtHeuwofIdEPsLn4qfAvJGeXhji7NPmWceqrtpJpH0SqP1CSzI9oeJSfetG9e0BSQISRbk9QdE+WYyz8PNNQghBk3fePoHyNBvI5m2M11HSgwq4lo2UEsqppexKA8pfAY7gcrVsn9UJIjbPJCwJDUobhPc/KkTK5Etb4v01xhRYdPNLk+eavDxqPMls9qVI8/s6tSEw44u0ybODZ7invk0dcsi9yxV5wRln2BhRyk",
"tags": [
"ov",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-2017-1000369",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2017-16943",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2017-16944",
"score": 7.5,
"severity": "high"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-06T21:09:40.612Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.5.5-10.1.48",
"product": "MariaDB",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mariadb:mariadb:5.5.5-10.1.48",
"part": "a",
"vendor": "mariadb",
"product": "mariadb",
"version": "5\\.5\\.5\\-10\\.1\\.48",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.5.5-10.1.48-MariaDB-0+deb9u2"
}
},
"cve": [
{
"id": "CVE-2005-0004",
"score": 4.6,
"severity": "medium"
},
{
"id": "CVE-2012-0540",
"score": 4,
"severity": "medium"
},
{
"id": "CVE-2012-0572",
"score": 4,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-06T13:46:11.488Z"
},
{
"port": 5000,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"http": {
"body": "{\"message\":\"URL string malformed close to position 1: \\\"\\/\\\"\",\"code\":\"InvalidUrl\"}",
"body_murmur": 1626570706,
"body_sha256": "406e8123cfb65e7198644a5b6ae57e6ded08ba9e7824c1f3993a887f7cad87cf",
"content_length": -1,
"headers": {
"access_control_allow_origin": [
"*"
],
"connection": [
"keep-alive"
],
"content_disposition": [
"inline; filename=\"response.json\""
],
"content_type": [
"application/json; charset=UTF-8"
],
"unknown": [
{
"key": "keep_alive",
"value": [
"timeout=5, max=512"
]
},
{
"key": "access_control_allow_methods",
"value": [
"GET"
]
},
{
"key": "access_control_allow_headers",
"value": [
"X-Requested-With, Content-Type"
]
}
]
},
"protocol": "HTTP/1.0",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "176.9.100.173:5000",
"path": "",
"scheme": "http"
}
},
"status_code": 400
}
},
"url": "http://176.9.100.173:5000/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-11-06T15:13:15.586Z"
}
],
"services_hash": "7a032c473993738c3392955c754c07f050043f03bd411dc23ae5888d6a19e142",
"last_updated_at": "2025-11-07T20:14:03.168Z",
"banner": [
"mysql",
"ssh",
"http",
"pop3",
"tls",
"smtp",
"ftp",
"imap"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0431": {
"id": "CVE-1999-0431",
"references": [
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-0656": {
"id": "CVE-1999-0656",
"references": [
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348",
"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/348"
],
"score": 5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "CWE-16"
},
"CVE-1999-1285": {
"id": "CVE-1999-1285",
"references": [
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472",
"http://marc.info/?l=bugtraq&m=91495921611500&w=2",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472"
],
"score": 2.1,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.",
"vector_string": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-Other"
},
"CVE-1999-1442": {
"id": "CVE-1999-1442",
"references": [
"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html",
"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html",
"http://www.securityfocus.com/bid/105"
],
"score": 7.2,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2005-0004": {
"id": "CVE-2005-0004",
"references": [
"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
"http://lists.mysql.com/internals/20600",
"http://marc.info/?l=bugtraq&m=110608297217224&w=2",
"http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
"http://secunia.com/advisories/13867",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
"http://www.debian.org/security/2005/dsa-647",
"http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
"http://www.securityfocus.com/bid/12277",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/18922",
"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
"http://lists.mysql.com/internals/20600",
"http://marc.info/?l=bugtraq&m=110608297217224&w=2",
"http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
"http://secunia.com/advisories/13867",
"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
"http://www.debian.org/security/2005/dsa-647",
"http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
"http://www.securityfocus.com/bid/12277",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/18922"
],
"score": 4.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-59"
},
"CVE-2007-2768": {
"id": "CVE-2007-2768",
"references": [
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/",
"http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
"http://www.osvdb.org/34601",
"https://security.netapp.com/advisory/ntap-20191107-0002/"
],
"score": 4.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2008-3844": {
"id": "CVE-2008-3844",
"references": [
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
"http://secunia.com/advisories/31575",
"http://secunia.com/advisories/32241",
"http://securitytracker.com/id?1020730",
"http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
"http://www.redhat.com/security/data/openssh-blacklist.html",
"http://www.redhat.com/support/errata/RHSA-2008-0855.html",
"http://www.securityfocus.com/bid/30794",
"http://www.vupen.com/english/advisories/2008/2821",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
],
"score": 9.3,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact. NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points. As of 20080827, no unofficial distributions of this software are known.",
"vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"weakness": "CWE-20"
},
"CVE-2012-0540": {
"id": "CVE-2012-0540",
"references": [
"http://osvdb.org/83976",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54551",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77061",
"http://osvdb.org/83976",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54551",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77061"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0572": {
"id": "CVE-2012-0572",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0574": {
"id": "CVE-2012-0574",
"references": [
"http://marc.info/?l=bugtraq&m=135109152819176&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266",
"http://marc.info/?l=bugtraq&m=135109152819176&w=2",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-0578": {
"id": "CVE-2012-0578",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1688": {
"id": "CVE-2012-1688",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53067",
"http://www.securitytracker.com/id?1026934",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53067",
"http://www.securitytracker.com/id?1026934"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1689": {
"id": "CVE-2012-1689",
"references": [
"http://osvdb.org/83980",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54547",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77065",
"http://osvdb.org/83980",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54547",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77065"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1690": {
"id": "CVE-2012-1690",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53074",
"http://www.securitytracker.com/id?1026934",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53074",
"http://www.securitytracker.com/id?1026934"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1703.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1697": {
"id": "CVE-2012-1697",
"references": [
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53064",
"http://www.securitytracker.com/id?1026934",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53064",
"http://www.securitytracker.com/id?1026934"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1702": {
"id": "CVE-2012-1702",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1703": {
"id": "CVE-2012-1703",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53058",
"http://www.securitytracker.com/id?1026934",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/48890",
"http://secunia.com/advisories/49179",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
"http://www.securityfocus.com/bid/53058",
"http://www.securitytracker.com/id?1026934"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1690.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1705": {
"id": "CVE-2012-1705",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1734": {
"id": "CVE-2012-1734",
"references": [
"http://osvdb.org/83979",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54540",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77064",
"http://osvdb.org/83979",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54540",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77064"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1735": {
"id": "CVE-2012-1735",
"references": [
"http://osvdb.org/83975",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54549",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77060",
"http://osvdb.org/83975",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54549",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77060"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1756": {
"id": "CVE-2012-1756",
"references": [
"http://osvdb.org/83978",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54524",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77063",
"http://osvdb.org/83978",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54524",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77063"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-1757": {
"id": "CVE-2012-1757",
"references": [
"http://osvdb.org/83977",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54526",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77062",
"http://osvdb.org/83977",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"http://www.securityfocus.com/bid/54526",
"http://www.securitytracker.com/id?1027263",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/77062"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-2750": {
"id": "CVE-2012-2750",
"references": [
"http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.securityfocus.com/bid/63125",
"http://www.securitytracker.com/id/1029184",
"https://bugzilla.redhat.com/show_bug.cgi?id=833742",
"http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.securityfocus.com/bid/63125",
"http://www.securitytracker.com/id/1029184",
"https://bugzilla.redhat.com/show_bug.cgi?id=833742"
],
"score": 10,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a \"Security Fix\", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3150": {
"id": "CVE-2012-3150",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79388",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79388"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3158": {
"id": "CVE-2012-3158",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79382",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79382"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3160": {
"id": "CVE-2012-3160",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79394",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79394"
],
"score": 2.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3163": {
"id": "CVE-2012-3163",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/56509",
"http://secunia.com/advisories/56513",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79381",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/56509",
"http://secunia.com/advisories/56513",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79381"
],
"score": 9,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3166": {
"id": "CVE-2012-3166",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3167": {
"id": "CVE-2012-3167",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79392",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79392"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3173": {
"id": "CVE-2012-3173",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79386",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79386"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3177": {
"id": "CVE-2012-3177",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79383",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79383"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3180": {
"id": "CVE-2012-3180",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79389",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79389"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-3197": {
"id": "CVE-2012-3197",
"references": [
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79393",
"http://rhn.redhat.com/errata/RHSA-2012-1462.html",
"http://secunia.com/advisories/51177",
"http://secunia.com/advisories/51309",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2012/dsa-2581",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
"http://www.ubuntu.com/usn/USN-1621-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/79393"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5060": {
"id": "CVE-2012-5060",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5096": {
"id": "CVE-2012-5096",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5612": {
"id": "CVE-2012-5612",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
"http://seclists.org/fulldisclosure/2012/Dec/5",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.exploit-db.com/exploits/23076",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://mariadb.atlassian.net/browse/MDEV-3908",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960",
"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
"http://seclists.org/fulldisclosure/2012/Dec/5",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.exploit-db.com/exploits/23076",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://mariadb.atlassian.net/browse/MDEV-3908",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "CWE-787"
},
"CVE-2012-5614": {
"id": "CVE-2012-5614",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://seclists.org/fulldisclosure/2012/Dec/7",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.securitytracker.com/id?1027829",
"https://bugzilla.redhat.com/show_bug.cgi?id=882607",
"https://mariadb.atlassian.net/browse/MDEV-3910",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://seclists.org/fulldisclosure/2012/Dec/7",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.openwall.com/lists/oss-security/2012/12/02/3",
"http://www.openwall.com/lists/oss-security/2012/12/02/4",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://www.securitytracker.com/id?1027829",
"https://bugzilla.redhat.com/show_bug.cgi?id=882607",
"https://mariadb.atlassian.net/browse/MDEV-3910"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2012-5627": {
"id": "CVE-2012-5627",
"references": [
"http://seclists.org/fulldisclosure/2012/Dec/58",
"http://seclists.org/fulldisclosure/2012/Dec/83",
"http://seclists.org/oss-sec/2012/q4/424",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"https://bugzilla.redhat.com/show_bug.cgi?id=883719",
"https://mariadb.atlassian.net/browse/MDEV-3915",
"http://seclists.org/fulldisclosure/2012/Dec/58",
"http://seclists.org/fulldisclosure/2012/Dec/83",
"http://seclists.org/oss-sec/2012/q4/424",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
"https://bugzilla.redhat.com/show_bug.cgi?id=883719",
"https://mariadb.atlassian.net/browse/MDEV-3915"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"weakness": "CWE-522"
},
"CVE-2013-0367": {
"id": "CVE-2013-0367",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0368": {
"id": "CVE-2013-0368",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0371": {
"id": "CVE-2013-0371",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0383": {
"id": "CVE-2013-0383",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0384": {
"id": "CVE-2013-0384",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0385": {
"id": "CVE-2013-0385",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267"
],
"score": 6.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0386": {
"id": "CVE-2013-0386",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-0389": {
"id": "CVE-2013-0389",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825",
"http://rhn.redhat.com/errata/RHSA-2013-0219.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
"http://www.ubuntu.com/usn/USN-1703-1",
"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1502": {
"id": "CVE-2013-1502",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 1.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:L/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1506": {
"id": "CVE-2013-1506",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1511": {
"id": "CVE-2013-1511",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1512": {
"id": "CVE-2013-1512",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1521": {
"id": "CVE-2013-1521",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1523": {
"id": "CVE-2013-1523",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1526": {
"id": "CVE-2013-1526",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1531": {
"id": "CVE-2013-1531",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1532": {
"id": "CVE-2013-1532",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1544": {
"id": "CVE-2013-1544",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1548": {
"id": "CVE-2013-1548",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.63 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Types.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1552": {
"id": "CVE-2013-1552",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1555": {
"id": "CVE-2013-1555",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-1861": {
"id": "CVE-2013-1861",
"references": [
"http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://seclists.org/oss-sec/2013/q1/671",
"http://secunia.com/advisories/52639",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.osvdb.org/91415",
"http://www.securityfocus.com/bid/58511",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://bugzilla.redhat.com/show_bug.cgi?id=919247",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
"https://mariadb.atlassian.net/browse/MDEV-4252",
"http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://seclists.org/oss-sec/2013/q1/671",
"http://secunia.com/advisories/52639",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.osvdb.org/91415",
"http://www.securityfocus.com/bid/58511",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://bugzilla.redhat.com/show_bug.cgi?id=919247",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
"https://mariadb.atlassian.net/browse/MDEV-4252"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "CWE-119"
},
"CVE-2013-2375": {
"id": "CVE-2013-2375",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2376": {
"id": "CVE-2013-2376",
"references": [
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2378": {
"id": "CVE-2013-2378",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2389": {
"id": "CVE-2013-2389",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2391": {
"id": "CVE-2013-2391",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.",
"vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-2392": {
"id": "CVE-2013-2392",
"references": [
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
"http://rhn.redhat.com/errata/RHSA-2013-0772.html",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
"http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3783": {
"id": "CVE-2013-3783",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95332",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61210",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85719",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95332",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61210",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85719"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3793": {
"id": "CVE-2013-3793",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95323",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61264",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85710",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95323",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61264",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85710"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3794": {
"id": "CVE-2013-3794",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95333",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61222",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95333",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61222"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3801": {
"id": "CVE-2013-3801",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95331",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61269",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95331",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61269"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3802": {
"id": "CVE-2013-3802",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95325",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61244",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85712",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95325",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.securityfocus.com/bid/61244",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85712"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3804": {
"id": "CVE-2013-3804",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95328",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85715",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95328",
"http://secunia.com/advisories/53372",
"http://secunia.com/advisories/54300",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85715"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3805": {
"id": "CVE-2013-3805",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95327",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95327",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3808": {
"id": "CVE-2013-3808",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95330",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85717",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95330",
"http://secunia.com/advisories/53372",
"http://security.gentoo.org/glsa/glsa-201308-06.xml",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85717"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3809": {
"id": "CVE-2013-3809",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95322",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85709",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95322",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85709"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3812": {
"id": "CVE-2013-3812",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95336",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85723",
"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
"http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
"http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
"http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
"http://osvdb.org/95336",
"http://secunia.com/advisories/54300",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
"http://www.ubuntu.com/usn/USN-1909-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/85723"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-3839": {
"id": "CVE-2013-3839",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/55291",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63109",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/55291",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2780",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63109",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-5807": {
"id": "CVE-2013-5807",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63105",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.debian.org/security/2013/dsa-2818",
"http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
"http://www.securityfocus.com/bid/63105",
"http://www.securitytracker.com/id/1029184",
"http://www.ubuntu.com/usn/USN-2006-1"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.x through 5.5.32 and 5.6.x through 5.6.12 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-5891": {
"id": "CVE-2013-5891",
"references": [
"http://osvdb.org/102070",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64891",
"http://osvdb.org/102070",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64891"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2013-5908": {
"id": "CVE-2013-5908",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://osvdb.org/102078",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64896",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90389",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://osvdb.org/102078",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64896",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90389"
],
"score": 2.6,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0001": {
"id": "CVE-2014-0001",
"references": [
"http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
"http://osvdb.org/102713",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/52161",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
"http://www.osvdb.org/102714",
"http://www.securityfocus.com/bid/65298",
"http://www.securitytracker.com/id/1029708",
"https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
"https://mariadb.com/kb/en/mariadb-5535-changelog/",
"http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
"http://osvdb.org/102713",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/52161",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
"http://www.osvdb.org/102714",
"http://www.securityfocus.com/bid/65298",
"http://www.securitytracker.com/id/1029708",
"https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
"https://mariadb.com/kb/en/mariadb-5535-changelog/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "CWE-119"
},
"CVE-2014-0384": {
"id": "CVE-2014-0384",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0386": {
"id": "CVE-2014-0386",
"references": [
"http://osvdb.org/102069",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64904",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90380",
"http://osvdb.org/102069",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64904",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90380"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0393": {
"id": "CVE-2014-0393",
"references": [
"http://osvdb.org/102075",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64877",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90386",
"http://osvdb.org/102075",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64877",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90386"
],
"score": 3.3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0401": {
"id": "CVE-2014-0401",
"references": [
"http://osvdb.org/102071",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64898",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90382",
"http://osvdb.org/102071",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64898",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90382"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0402": {
"id": "CVE-2014-0402",
"references": [
"http://osvdb.org/102068",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64908",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90379",
"http://osvdb.org/102068",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64908",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90379"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0412": {
"id": "CVE-2014-0412",
"references": [
"http://osvdb.org/102067",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64880",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90378",
"http://osvdb.org/102067",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64880",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90378"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0420": {
"id": "CVE-2014-0420",
"references": [
"http://osvdb.org/102077",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64888",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90388",
"http://osvdb.org/102077",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64888",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90388"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-0437": {
"id": "CVE-2014-0437",
"references": [
"http://osvdb.org/102074",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64849",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90385",
"http://osvdb.org/102074",
"http://rhn.redhat.com/errata/RHSA-2014-0164.html",
"http://rhn.redhat.com/errata/RHSA-2014-0173.html",
"http://rhn.redhat.com/errata/RHSA-2014-0186.html",
"http://rhn.redhat.com/errata/RHSA-2014-0189.html",
"http://secunia.com/advisories/56491",
"http://secunia.com/advisories/56541",
"http://secunia.com/advisories/56580",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://ubuntu.com/usn/usn-2086-1",
"http://www.debian.org/security/2014/dsa-2845",
"http://www.debian.org/security/2014/dsa-2848",
"http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"http://www.securityfocus.com/bid/64758",
"http://www.securityfocus.com/bid/64849",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/90385"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2419": {
"id": "CVE-2014-2419",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66880",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66880"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2430": {
"id": "CVE-2014-2430",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66858",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66858"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2431": {
"id": "CVE-2014-2431",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66890",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66890"
],
"score": 2.6,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.",
"vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2432": {
"id": "CVE-2014-2432",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66875",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66875"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2436": {
"id": "CVE-2014-2436",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66896",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66896"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2438": {
"id": "CVE-2014-2438",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66846",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66846"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2440": {
"id": "CVE-2014-2440",
"references": [
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66850",
"http://rhn.redhat.com/errata/RHSA-2014-0522.html",
"http://rhn.redhat.com/errata/RHSA-2014-0536.html",
"http://rhn.redhat.com/errata/RHSA-2014-0537.html",
"http://rhn.redhat.com/errata/RHSA-2014-0702.html",
"http://security.gentoo.org/glsa/glsa-201409-04.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
"http://www.securityfocus.com/bid/66850"
],
"score": 5.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
"vector_string": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-2494": {
"id": "CVE-2014-2494",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4207": {
"id": "CVE-2014-4207",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68593",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94624",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68593",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94624"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4243": {
"id": "CVE-2014-4243",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68611",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94628",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68611",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94628"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4258": {
"id": "CVE-2014-4258",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68564",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94620",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68564",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94620"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4260": {
"id": "CVE-2014-4260",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68573",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94621",
"http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://seclists.org/fulldisclosure/2014/Dec/23",
"http://secunia.com/advisories/60425",
"http://www.debian.org/security/2014/dsa-2985",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
"http://www.securityfocus.com/archive/1/534161/100/0/threaded",
"http://www.securityfocus.com/bid/68573",
"http://www.securitytracker.com/id/1030578",
"http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/94621"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4274": {
"id": "CVE-2014-4274",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/69732",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/69732"
],
"score": 4.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.",
"vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-4287": {
"id": "CVE-2014-4287",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70517",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70517"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6463": {
"id": "CVE-2014-6463",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70532",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70532"
],
"score": 3.3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.",
"vector_string": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6464": {
"id": "CVE-2014-6464",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70451",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70451"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6469": {
"id": "CVE-2014-6469",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70446",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70446"
],
"score": 6.8,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6478": {
"id": "CVE-2014-6478",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70489",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70489"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6484": {
"id": "CVE-2014-6484",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70455",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70455"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6491": {
"id": "CVE-2014-6491",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70444",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70444"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6494": {
"id": "CVE-2014-6494",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70497",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70497"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6495": {
"id": "CVE-2014-6495",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70496",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70496"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6496": {
"id": "CVE-2014-6496",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70469",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70469"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6500": {
"id": "CVE-2014-6500",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70478",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70478"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6505": {
"id": "CVE-2014-6505",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70516",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70516"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6507": {
"id": "CVE-2014-6507",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70550",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70550"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6520": {
"id": "CVE-2014-6520",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70510",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70510"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6530": {
"id": "CVE-2014-6530",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70486",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70486"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6551": {
"id": "CVE-2014-6551",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70462",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70462"
],
"score": 2.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.",
"vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6555": {
"id": "CVE-2014-6555",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70530",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70530"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6559": {
"id": "CVE-2014-6559",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70487",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://secunia.com/advisories/61579",
"http://secunia.com/advisories/62073",
"http://security.gentoo.org/glsa/glsa-201411-02.xml",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
"http://www.securityfocus.com/bid/70487"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2014-6568": {
"id": "CVE-2014-6568",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72210",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72210",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0374": {
"id": "CVE-2015-0374",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72227",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72227",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
"vector_string": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0381": {
"id": "CVE-2015-0381",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72214",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72214",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0382": {
"id": "CVE-2015-0382",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72200",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72200",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
"vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0391": {
"id": "CVE-2015-0391",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72205",
"http://www.securitytracker.com/id/1031581",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72205",
"http://www.securitytracker.com/id/1031581",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0411": {
"id": "CVE-2015-0411",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72191",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72191",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
"vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0432": {
"id": "CVE-2015-0432",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72217",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
"https://security.gentoo.org/glsa/201504-05",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2015-0116.html",
"http://rhn.redhat.com/errata/RHSA-2015-0117.html",
"http://rhn.redhat.com/errata/RHSA-2015-0118.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://secunia.com/advisories/62728",
"http://secunia.com/advisories/62730",
"http://secunia.com/advisories/62732",
"http://www.debian.org/security/2015/dsa-3135",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"http://www.securityfocus.com/bid/72217",
"http://www.securitytracker.com/id/1031581",
"http://www.ubuntu.com/usn/USN-2480-1",
"https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
"https://security.gentoo.org/glsa/201504-05"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0433": {
"id": "CVE-2015-0433",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0441": {
"id": "CVE-2015-0441",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0499": {
"id": "CVE-2015-0499",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0501": {
"id": "CVE-2015-0501",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 5.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-0505": {
"id": "CVE-2015-0505",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74112",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74112",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2325": {
"id": "CVE-2015-2325",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
"https://bugs.exim.org/show_bug.cgi?id=1591",
"https://fortiguard.com/zeroday/FG-VD-15-015",
"https://www.pcre.org/original/changelog.txt",
"http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
"https://bugs.exim.org/show_bug.cgi?id=1591",
"https://fortiguard.com/zeroday/FG-VD-15-015",
"https://www.pcre.org/original/changelog.txt"
],
"score": 7.8,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-125"
},
"CVE-2015-2568": {
"id": "CVE-2015-2568",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74073",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74073",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2571": {
"id": "CVE-2015-2571",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74095",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74095",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2573": {
"id": "CVE-2015-2573",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74078",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19",
"http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3229",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
"http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
"http://www.securityfocus.com/bid/74078",
"http://www.securitytracker.com/id/1032121",
"http://www.ubuntu.com/usn/USN-2575-1",
"https://security.gentoo.org/glsa/201507-19"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2582": {
"id": "CVE-2015-2582",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75751",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75751",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2620": {
"id": "CVE-2015-2620",
"references": [
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75837",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75837",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2643": {
"id": "CVE-2015-2643",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75830",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75830",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-2648": {
"id": "CVE-2015-2648",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75822",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75822",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-3152": {
"id": "CVE-2015-3152",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
"http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
"http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
"http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.ocert.org/advisories/ocert-2015-003.html",
"http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
"http://www.securityfocus.com/bid/74398",
"http://www.securitytracker.com/id/1032216",
"https://access.redhat.com/security/cve/cve-2015-3152",
"https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
"https://jira.mariadb.org/browse/MDEV-7937",
"https://www.duosecurity.com/blog/backronym-mysql-vulnerability",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
"http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
"http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
"http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.ocert.org/advisories/ocert-2015-003.html",
"http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
"http://www.securityfocus.com/bid/74398",
"http://www.securitytracker.com/id/1032216",
"https://access.redhat.com/security/cve/cve-2015-3152",
"https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
"https://jira.mariadb.org/browse/MDEV-7937",
"https://www.duosecurity.com/blog/backronym-mysql-vulnerability"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a \"BACKRONYM\" attack.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-295"
},
"CVE-2015-4752": {
"id": "CVE-2015-4752",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75849",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3308",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75849",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4757": {
"id": "CVE-2015-4757",
"references": [
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75759",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06",
"http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1629.html",
"http://rhn.redhat.com/errata/RHSA-2015-1630.html",
"http://rhn.redhat.com/errata/RHSA-2015-1646.html",
"http://rhn.redhat.com/errata/RHSA-2015-1647.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.debian.org/security/2015/dsa-3311",
"http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
"http://www.securityfocus.com/bid/75759",
"http://www.securitytracker.com/id/1032911",
"http://www.ubuntu.com/usn/USN-2674-1",
"https://security.gentoo.org/glsa/201610-06"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4792": {
"id": "CVE-2015-4792",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77171",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77171",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 1.7,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.",
"vector_string": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4802": {
"id": "CVE-2015-4802",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77165",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77165",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4807": {
"id": "CVE-2015-4807",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77205",
"http://www.securitytracker.com/id/1033894",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77205",
"http://www.securitytracker.com/id/1033894",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4815": {
"id": "CVE-2015-4815",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77222",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77222",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4816": {
"id": "CVE-2015-4816",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77134",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77134",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4819": {
"id": "CVE-2015-4819",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77196",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77196",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 7.2,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.",
"vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4826": {
"id": "CVE-2015-4826",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77237",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77237",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.",
"vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4830": {
"id": "CVE-2015-4830",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77228",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77228",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4836": {
"id": "CVE-2015-4836",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77190",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77190",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 2.8,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.",
"vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4858": {
"id": "CVE-2015-4858",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77145",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77145",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4861": {
"id": "CVE-2015-4861",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77137",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77137",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4864": {
"id": "CVE-2015-4864",
"references": [
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77187",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2015-1665.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.securityfocus.com/bid/77187",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4870": {
"id": "CVE-2015-4870",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77208",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.exploit-db.com/exploits/39867/",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77208",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.exploit-db.com/exploits/39867/",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4879": {
"id": "CVE-2015-4879",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77140",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://rhn.redhat.com/errata/RHSA-2015-1628.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77140",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 4.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.",
"vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-4913": {
"id": "CVE-2015-4913",
"references": [
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77153",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
"http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
"http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2015/dsa-3377",
"http://www.debian.org/security/2015/dsa-3385",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/77153",
"http://www.securitytracker.com/id/1033894",
"http://www.ubuntu.com/usn/USN-2781-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2015-7744": {
"id": "CVE-2015-7744",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708",
"https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
"https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708",
"https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
"https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0502": {
"id": "CVE-2016-0502",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securitytracker.com/id/1034708"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0610": {
"id": "CVE-2016-0610",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securityfocus.com/bid/81198",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.securityfocus.com/bid/81198",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/"
],
"score": 3.5,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
"vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0616": {
"id": "CVE-2016-0616",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3453",
"http://www.debian.org/security/2016/dsa-3459",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/81176",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
"https://mariadb.com/kb/en/mdb-10023-rn/",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3453",
"http://www.debian.org/security/2016/dsa-3459",
"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
"http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
"http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
"http://www.securityfocus.com/bid/81176",
"http://www.securitytracker.com/id/1034708",
"http://www.ubuntu.com/usn/USN-2881-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
"https://mariadb.com/kb/en/mdb-10023-rn/"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
"vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0642": {
"id": "CVE-2016-0642",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3557",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securityfocus.com/bid/86445",
"http://www.securitytracker.com/id/1035606",
"http://www.ubuntu.com/usn/USN-2953-1",
"http://www.ubuntu.com/usn/USN-2954-1",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.debian.org/security/2016/dsa-3557",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securityfocus.com/bid/86445",
"http://www.securitytracker.com/id/1035606",
"http://www.ubuntu.com/usn/USN-2953-1",
"http://www.ubuntu.com/usn/USN-2954-1",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 4.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-0651": {
"id": "CVE-2016-0651",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securitytracker.com/id/1035606",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
"http://www.securitytracker.com/id/1035606",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-20012": {
"id": "CVE-2016-20012",
"references": [
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1",
"https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
"https://github.com/openssh/openssh-portable/pull/270",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
"https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
"https://rushter.com/blog/public-ssh-keys/",
"https://security.netapp.com/advisory/ntap-20211014-0005/",
"https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
"https://www.openwall.com/lists/oss-security/2018/08/24/1"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2016-3471": {
"id": "CVE-2016-3471",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.securityfocus.com/bid/91787",
"http://www.securityfocus.com/bid/91913",
"http://www.securitytracker.com/id/1036362",
"https://access.redhat.com/errata/RHSA-2016:1132",
"http://rhn.redhat.com/errata/RHSA-2016-0534.html",
"http://rhn.redhat.com/errata/RHSA-2016-0705.html",
"http://rhn.redhat.com/errata/RHSA-2016-1480.html",
"http://rhn.redhat.com/errata/RHSA-2016-1481.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
"http://www.securityfocus.com/bid/91787",
"http://www.securityfocus.com/bid/91913",
"http://www.securitytracker.com/id/1036362",
"https://access.redhat.com/errata/RHSA-2016:1132"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-3492": {
"id": "CVE-2016-3492",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93650",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93650",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5584": {
"id": "CVE-2016-5584",
"references": [
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93735",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93735",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5612": {
"id": "CVE-2016-5612",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-1601.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93630",
"http://www.securitytracker.com/id/1037050",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-1601.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93630",
"http://www.securitytracker.com/id/1037050",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5624": {
"id": "CVE-2016-5624",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93635",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93635",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5626": {
"id": "CVE-2016-5626",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93638",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93638",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-5629": {
"id": "CVE-2016-5629",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93668",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2131.html",
"http://rhn.redhat.com/errata/RHSA-2016-2595.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93668",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
"https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
"https://security.gentoo.org/glsa/201701-01"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-6664": {
"id": "CVE-2016-6664",
"references": [
"http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
"http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://seclists.org/fulldisclosure/2016/Nov/4",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/archive/1/539695/100/0/threaded",
"http://www.securityfocus.com/bid/93612",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-18",
"https://www.exploit-db.com/exploits/40679/",
"https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/",
"http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
"http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
"http://rhn.redhat.com/errata/RHSA-2016-2130.html",
"http://rhn.redhat.com/errata/RHSA-2016-2749.html",
"http://seclists.org/fulldisclosure/2016/Nov/4",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/archive/1/539695/100/0/threaded",
"http://www.securityfocus.com/bid/93612",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-18",
"https://www.exploit-db.com/exploits/40679/",
"https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/"
],
"score": 7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-59"
},
"CVE-2016-7440": {
"id": "CVE-2016-7440",
"references": [
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93659",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html",
"http://www.debian.org/security/2016/dsa-3706",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"http://www.securityfocus.com/bid/93659",
"http://www.securitytracker.com/id/1037050",
"https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
"https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2016-9843": {
"id": "CVE-2016-9843",
"references": [
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
"https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
"https://security.gentoo.org/glsa/201701-56",
"https://security.gentoo.org/glsa/202007-54",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://usn.ubuntu.com/4246-1/",
"https://usn.ubuntu.com/4292-1/",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
"http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
"http://www.openwall.com/lists/oss-security/2016/12/05/21",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/95131",
"http://www.securitytracker.com/id/1039427",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2017:1220",
"https://access.redhat.com/errata/RHSA-2017:1221",
"https://access.redhat.com/errata/RHSA-2017:1222",
"https://access.redhat.com/errata/RHSA-2017:2999",
"https://access.redhat.com/errata/RHSA-2017:3046",
"https://access.redhat.com/errata/RHSA-2017:3047",
"https://access.redhat.com/errata/RHSA-2017:3453",
"https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
"https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
"https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
"https://security.gentoo.org/glsa/201701-56",
"https://security.gentoo.org/glsa/202007-54",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://support.apple.com/HT208112",
"https://support.apple.com/HT208113",
"https://support.apple.com/HT208115",
"https://support.apple.com/HT208144",
"https://usn.ubuntu.com/4246-1/",
"https://usn.ubuntu.com/4292-1/",
"https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
"https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
"https://www.oracle.com/security-alerts/cpujul2020.html"
],
"score": 9.8,
"services": [
"3306/mysql"
],
"severity": "critical",
"summary": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-1000369": {
"id": "CVE-2017-1000369",
"references": [
"http://www.debian.org/security/2017/dsa-3888",
"http://www.securityfocus.com/bid/99252",
"http://www.securitytracker.com/id/1038779",
"https://access.redhat.com/security/cve/CVE-2017-1000369",
"https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21",
"https://security.gentoo.org/glsa/201709-19",
"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt",
"http://www.debian.org/security/2017/dsa-3888",
"http://www.securityfocus.com/bid/99252",
"http://www.securitytracker.com/id/1038779",
"https://access.redhat.com/security/cve/CVE-2017-1000369",
"https://github.com/Exim/exim/commit/65e061b76867a9ea7aeeb535341b790b90ae6c21",
"https://security.gentoo.org/glsa/201709-19",
"https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt"
],
"score": 4,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim supports the use of multiple \"-p\" command line arguments which are malloc()'ed and never free()'ed, used in conjunction with other issues allows attackers to cause arbitrary code execution. This affects exim version 4.89 and earlier. Please note that at this time upstream has released a patch (commit 65e061b76867a9ea7aeeb535341b790b90ae6c21), but it is not known if a new point release is available that addresses this issue at this time.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-404"
},
"CVE-2017-10268": {
"id": "CVE-2017-10268",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101390",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101390",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-10378": {
"id": "CVE-2017-10378",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101375",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101375",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-10379": {
"id": "CVE-2017-10379",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101415",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101415",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-863"
},
"CVE-2017-10384": {
"id": "CVE-2017-10384",
"references": [
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101406",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/",
"http://www.debian.org/security/2017/dsa-4002",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"http://www.securityfocus.com/bid/101406",
"http://www.securitytracker.com/id/1039597",
"https://access.redhat.com/errata/RHSA-2017:3265",
"https://access.redhat.com/errata/RHSA-2017:3442",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://security.netapp.com/advisory/ntap-20171019-0002/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-15365": {
"id": "CVE-2017-15365",
"references": [
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
"https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
"https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
"https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
"https://www.debian.org/security/2018/dsa-4341",
"https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
"https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
"https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
"https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
"https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
"https://www.debian.org/security/2018/dsa-4341",
"https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
"https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html"
],
"score": 8.8,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-15906": {
"id": "CVE-2017-15906",
"references": [
"http://www.securityfocus.com/bid/101552",
"https://access.redhat.com/errata/RHSA-2018:0980",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html",
"https://security.gentoo.org/glsa/201801-05",
"https://security.netapp.com/advisory/ntap-20180423-0004/",
"https://www.openssh.com/txt/release-7.6",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://www.securityfocus.com/bid/101552",
"https://access.redhat.com/errata/RHSA-2018:0980",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
"https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html",
"https://security.gentoo.org/glsa/201801-05",
"https://security.netapp.com/advisory/ntap-20180423-0004/",
"https://www.openssh.com/txt/release-7.6",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-732"
},
"CVE-2017-16943": {
"id": "CVE-2017-16943",
"references": [
"http://openwall.com/lists/oss-security/2017/11/25/1",
"http://openwall.com/lists/oss-security/2017/11/25/2",
"http://openwall.com/lists/oss-security/2017/11/25/3",
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"http://www.securitytracker.com/id/1039872",
"https://bugs.exim.org/show_bug.cgi?id=2199",
"https://git.exim.org/exim.git/commit/4090d62a4b25782129cc1643596dc2f6e8f63bde",
"https://git.exim.org/exim.git/commitdiff/4e6ae6235c68de243b1c2419027472d7659aa2b4",
"https://github.com/LetUsFsck/PoC-Exploit-Mirror/tree/master/CVE-2017-16944",
"https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
"https://www.debian.org/security/2017/dsa-4053"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via vectors involving BDAT commands.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2017-16944": {
"id": "CVE-2017-16944",
"references": [
"http://openwall.com/lists/oss-security/2017/11/25/1",
"http://openwall.com/lists/oss-security/2017/11/25/2",
"http://openwall.com/lists/oss-security/2017/11/25/3",
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"http://www.securitytracker.com/id/1039873",
"https://bugs.exim.org/show_bug.cgi?id=2201",
"https://lists.exim.org/lurker/message/20171125.034842.d1d75cac.en.html",
"https://www.debian.org/security/2017/dsa-4053",
"https://www.exploit-db.com/exploits/43184/"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "The receive_msg function in receive.c in the SMTP daemon in Exim 4.88 and 4.89 allows remote attackers to cause a denial of service (infinite loop and stack exhaustion) via vectors involving BDAT commands and an improper check for a '.' character signifying the end of the content, related to the bdat_getc function.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-835"
},
"CVE-2017-3238": {
"id": "CVE-2017-3238",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95571",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95571",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3243": {
"id": "CVE-2017-3243",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95538",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95538",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3244": {
"id": "CVE-2017-3244",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95565",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95565",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3258": {
"id": "CVE-2017-3258",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95560",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95560",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-20"
},
"CVE-2017-3265": {
"id": "CVE-2017-3265",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95520",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95520",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 5.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3291": {
"id": "CVE-2017-3291",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95501",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95501",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3302": {
"id": "CVE-2017-3302",
"references": [
"http://www.debian.org/security/2017/dsa-3809",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.openwall.com/lists/oss-security/2017/02/11/11",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/96162",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3809",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.openwall.com/lists/oss-security/2017/02/11/11",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/96162",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2017-3308": {
"id": "CVE-2017-3308",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97725",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97725",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 7.7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3309": {
"id": "CVE-2017-3309",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97742",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97742",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 7.7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3312": {
"id": "CVE-2017-3312",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95491",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95491",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 6.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3313": {
"id": "CVE-2017-3313",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3809",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95527",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3809",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95527",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17"
],
"score": 4.7,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3317": {
"id": "CVE-2017-3317",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95585",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95585",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3318": {
"id": "CVE-2017-3318",
"references": [
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95588",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18",
"http://www.debian.org/security/2017/dsa-3767",
"http://www.debian.org/security/2017/dsa-3770",
"http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
"http://www.securityfocus.com/bid/95588",
"http://www.securitytracker.com/id/1037640",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://security.gentoo.org/glsa/201702-17",
"https://security.gentoo.org/glsa/201702-18"
],
"score": 4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3453": {
"id": "CVE-2017-3453",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97776",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97776",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3456": {
"id": "CVE-2017-3456",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97831",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97831",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3464": {
"id": "CVE-2017-3464",
"references": [
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97818",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97818",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3600": {
"id": "CVE-2017-3600",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97765",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3834",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"http://www.securityfocus.com/bid/97765",
"http://www.securitytracker.com/id/1038287",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886"
],
"score": 6.6,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3636": {
"id": "CVE-2017-3636",
"references": [
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99736",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99736",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3641": {
"id": "CVE-2017-3641",
"references": [
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99767",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99767",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3651": {
"id": "CVE-2017-3651",
"references": [
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99802",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"http://rhn.redhat.com/errata/RHSA-2016-2927.html",
"http://rhn.redhat.com/errata/RHSA-2016-2928.html",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99802",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2192",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2017-3653": {
"id": "CVE-2017-3653",
"references": [
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99810",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955",
"http://www.debian.org/security/2017/dsa-3922",
"http://www.debian.org/security/2017/dsa-3944",
"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
"http://www.securityfocus.com/bid/99810",
"http://www.securitytracker.com/id/1038928",
"https://access.redhat.com/errata/RHSA-2017:2787",
"https://access.redhat.com/errata/RHSA-2017:2886",
"https://access.redhat.com/errata/RHSA-2018:0279",
"https://access.redhat.com/errata/RHSA-2018:0574",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://www.debian.org/security/2017/dsa-3955"
],
"score": 3.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-15473": {
"id": "CVE-2018-15473",
"references": [
"http://www.openwall.com/lists/oss-security/2018/08/15/5",
"http://www.securityfocus.com/bid/105140",
"http://www.securitytracker.com/id/1041487",
"https://access.redhat.com/errata/RHSA-2019:0711",
"https://access.redhat.com/errata/RHSA-2019:2143",
"https://bugs.debian.org/906236",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
"https://security.gentoo.org/glsa/201810-03",
"https://security.netapp.com/advisory/ntap-20181101-0001/",
"https://usn.ubuntu.com/3809-1/",
"https://www.debian.org/security/2018/dsa-4280",
"https://www.exploit-db.com/exploits/45210/",
"https://www.exploit-db.com/exploits/45233/",
"https://www.exploit-db.com/exploits/45939/",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://www.openwall.com/lists/oss-security/2018/08/15/5",
"http://www.securityfocus.com/bid/105140",
"http://www.securitytracker.com/id/1041487",
"https://access.redhat.com/errata/RHSA-2019:0711",
"https://access.redhat.com/errata/RHSA-2019:2143",
"https://bugs.debian.org/906236",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
"https://security.gentoo.org/glsa/201810-03",
"https://security.netapp.com/advisory/ntap-20181101-0001/",
"https://usn.ubuntu.com/3809-1/",
"https://www.debian.org/security/2018/dsa-4280",
"https://www.exploit-db.com/exploits/45210/",
"https://www.exploit-db.com/exploits/45233/",
"https://www.exploit-db.com/exploits/45939/",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-362"
},
"CVE-2018-15919": {
"id": "CVE-2018-15919",
"references": [
"http://seclists.org/oss-sec/2018/q3/180",
"http://www.securityfocus.com/bid/105163",
"https://security.netapp.com/advisory/ntap-20181221-0001/",
"http://seclists.org/oss-sec/2018/q3/180",
"http://www.securityfocus.com/bid/105163",
"https://security.netapp.com/advisory/ntap-20181221-0001/"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2018-20685": {
"id": "CVE-2018-20685",
"references": [
"http://www.securityfocus.com/bid/106531",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://security.gentoo.org/glsa/201903-16",
"https://security.gentoo.org/glsa/202007-53",
"https://security.netapp.com/advisory/ntap-20190215-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://www.securityfocus.com/bid/106531",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
"https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://security.gentoo.org/glsa/201903-16",
"https://security.gentoo.org/glsa/202007-53",
"https://security.netapp.com/advisory/ntap-20190215-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.3,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"weakness": "CWE-863"
},
"CVE-2018-2562": {
"id": "CVE-2018-2562",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102713",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102713",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 7.1,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2622": {
"id": "CVE-2018-2622",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102706",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102706",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2640": {
"id": "CVE-2018-2640",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102678",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102678",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2665": {
"id": "CVE-2018-2665",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102681",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102681",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2668": {
"id": "CVE-2018-2668",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102682",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"http://www.securityfocus.com/bid/102682",
"http://www.securitytracker.com/id/1040216",
"https://access.redhat.com/errata/RHSA-2018:0586",
"https://access.redhat.com/errata/RHSA-2018:0587",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.netapp.com/advisory/ntap-20180117-0002/",
"https://usn.ubuntu.com/3537-1/",
"https://usn.ubuntu.com/3537-2/",
"https://www.debian.org/security/2018/dsa-4091",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2755": {
"id": "CVE-2018-2755",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103807",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103807",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 7.7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2761": {
"id": "CVE-2018-2761",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103820",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103820",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2767": {
"id": "CVE-2018-2767",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/103954",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/103954",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 3.1,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2771": {
"id": "CVE-2018-2771",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103828",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103828",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2781": {
"id": "CVE-2018-2781",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103825",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103825",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2813": {
"id": "CVE-2018-2813",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103830",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103830",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2817": {
"id": "CVE-2018-2817",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103818",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103818",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-2819": {
"id": "CVE-2018-2819",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103814",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
"http://www.securityfocus.com/bid/103814",
"http://www.securitytracker.com/id/1040698",
"https://access.redhat.com/errata/RHSA-2018:1254",
"https://access.redhat.com/errata/RHSA-2018:2439",
"https://access.redhat.com/errata/RHSA-2018:2729",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
"https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20180419-0002/",
"https://usn.ubuntu.com/3629-1/",
"https://usn.ubuntu.com/3629-2/",
"https://usn.ubuntu.com/3629-3/",
"https://www.debian.org/security/2018/dsa-4176",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3058": {
"id": "CVE-2018-3058",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3063": {
"id": "CVE-2018-3063",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104786",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104786",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3066": {
"id": "CVE-2018-3066",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104766",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 3.3,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3081": {
"id": "CVE-2018-3081",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104779",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
"http://www.securityfocus.com/bid/104779",
"http://www.securitytracker.com/id/1041294",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20180726-0002/",
"https://usn.ubuntu.com/3725-1/",
"https://usn.ubuntu.com/3725-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3133": {
"id": "CVE-2018-3133",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3174": {
"id": "CVE-2018-3174",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105612",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105612",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-3282": {
"id": "CVE-2018-3282",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
"http://www.securityfocus.com/bid/105610",
"http://www.securitytracker.com/id/1041888",
"https://access.redhat.com/errata/RHSA-2018:3655",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
"https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20181018-0002/",
"https://usn.ubuntu.com/3799-1/",
"https://usn.ubuntu.com/3799-2/",
"https://www.debian.org/security/2018/dsa-4341"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2018-6789": {
"id": "CVE-2018-6789",
"references": [
"http://openwall.com/lists/oss-security/2018/02/10/2",
"http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
"http://www.openwall.com/lists/oss-security/2018/02/07/2",
"http://www.securityfocus.com/bid/103049",
"http://www.securitytracker.com/id/1040461",
"https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
"https://exim.org/static/doc/security/CVE-2018-6789.txt",
"https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html",
"https://usn.ubuntu.com/3565-1/",
"https://www.debian.org/security/2018/dsa-4110",
"https://www.exploit-db.com/exploits/44571/",
"https://www.exploit-db.com/exploits/45671/",
"http://openwall.com/lists/oss-security/2018/02/10/2",
"http://packetstormsecurity.com/files/162959/Exim-base64d-Buffer-Overflow.html",
"http://www.openwall.com/lists/oss-security/2018/02/07/2",
"http://www.securityfocus.com/bid/103049",
"http://www.securitytracker.com/id/1040461",
"https://devco.re/blog/2018/03/06/exim-off-by-one-RCE-exploiting-CVE-2018-6789-en/",
"https://exim.org/static/doc/security/CVE-2018-6789.txt",
"https://git.exim.org/exim.git/commit/cf3cd306062a08969c41a1cdd32c6855f1abecf1",
"https://lists.debian.org/debian-lts-announce/2018/02/msg00009.html",
"https://usn.ubuntu.com/3565-1/",
"https://www.debian.org/security/2018/dsa-4110",
"https://www.exploit-db.com/exploits/44571/",
"https://www.exploit-db.com/exploits/45671/"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "An issue was discovered in the base64d function in the SMTP listener in Exim before 4.90.1. By sending a handcrafted message, a buffer overflow may happen. This can be used to execute code remotely.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-120"
},
"CVE-2019-10149": {
"id": "CVE-2019-10149",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html",
"http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
"http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
"http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
"http://seclists.org/fulldisclosure/2019/Jun/16",
"http://www.openwall.com/lists/oss-security/2019/06/05/2",
"http://www.openwall.com/lists/oss-security/2019/06/05/3",
"http://www.openwall.com/lists/oss-security/2019/06/05/4",
"http://www.openwall.com/lists/oss-security/2019/06/06/1",
"http://www.openwall.com/lists/oss-security/2019/07/25/6",
"http://www.openwall.com/lists/oss-security/2019/07/25/7",
"http://www.openwall.com/lists/oss-security/2019/07/26/4",
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"http://www.securityfocus.com/bid/108679",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
"https://seclists.org/bugtraq/2019/Jun/5",
"https://security.gentoo.org/glsa/201906-01",
"https://usn.ubuntu.com/4010-1/",
"https://www.debian.org/security/2019/dsa-4456",
"https://www.exim.org/static/doc/security/CVE-2019-10149.txt",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00020.html",
"http://packetstormsecurity.com/files/153218/Exim-4.9.1-Remote-Command-Execution.html",
"http://packetstormsecurity.com/files/153312/Exim-4.91-Local-Privilege-Escalation.html",
"http://packetstormsecurity.com/files/154198/Exim-4.91-Local-Privilege-Escalation.html",
"http://seclists.org/fulldisclosure/2019/Jun/16",
"http://www.openwall.com/lists/oss-security/2019/06/05/2",
"http://www.openwall.com/lists/oss-security/2019/06/05/3",
"http://www.openwall.com/lists/oss-security/2019/06/05/4",
"http://www.openwall.com/lists/oss-security/2019/06/06/1",
"http://www.openwall.com/lists/oss-security/2019/07/25/6",
"http://www.openwall.com/lists/oss-security/2019/07/25/7",
"http://www.openwall.com/lists/oss-security/2019/07/26/4",
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"http://www.securityfocus.com/bid/108679",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10149",
"https://seclists.org/bugtraq/2019/Jun/5",
"https://security.gentoo.org/glsa/201906-01",
"https://usn.ubuntu.com/4010-1/",
"https://www.debian.org/security/2019/dsa-4456",
"https://www.exim.org/static/doc/security/CVE-2019-10149.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-78"
},
"CVE-2019-13917": {
"id": "CVE-2019-13917",
"references": [
"http://exim.org/static/doc/security/CVE-2019-13917.txt",
"http://www.openwall.com/lists/oss-security/2019/07/26/5",
"https://seclists.org/bugtraq/2019/Jul/51",
"https://security.gentoo.org/glsa/201909-06",
"https://www.debian.org/security/2019/dsa-4488",
"http://exim.org/static/doc/security/CVE-2019-13917.txt",
"http://www.openwall.com/lists/oss-security/2019/07/26/5",
"https://seclists.org/bugtraq/2019/Jul/51",
"https://security.gentoo.org/glsa/201909-06",
"https://www.debian.org/security/2019/dsa-4488"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4.85 through 4.92 (fixed in 4.92.1) allows remote code execution as root in some unusual configurations that use the ${sort } expansion for items that can be controlled by an attacker (e.g., $local_part or $domain).",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-19"
},
"CVE-2019-15846": {
"id": "CVE-2019-15846",
"references": [
"http://exim.org/static/doc/security/CVE-2019-15846.txt",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
"http://www.openwall.com/lists/oss-security/2019/09/06/2",
"http://www.openwall.com/lists/oss-security/2019/09/06/4",
"http://www.openwall.com/lists/oss-security/2019/09/06/5",
"http://www.openwall.com/lists/oss-security/2019/09/06/6",
"http://www.openwall.com/lists/oss-security/2019/09/06/8",
"http://www.openwall.com/lists/oss-security/2019/09/07/1",
"http://www.openwall.com/lists/oss-security/2019/09/07/2",
"http://www.openwall.com/lists/oss-security/2019/09/08/1",
"http://www.openwall.com/lists/oss-security/2019/09/09/1",
"https://exim.org/static/doc/security/CVE-2019-15846.txt",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
"https://seclists.org/bugtraq/2019/Sep/13",
"https://security.gentoo.org/glsa/201909-06",
"https://usn.ubuntu.com/4124-1/",
"https://usn.ubuntu.com/4124-2/",
"https://www.debian.org/security/2019/dsa-4517",
"https://www.kb.cert.org/vuls/id/672565",
"https://www.openwall.com/lists/oss-security/2019/09/06/1",
"http://exim.org/static/doc/security/CVE-2019-15846.txt",
"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00024.html",
"http://www.openwall.com/lists/oss-security/2019/09/06/2",
"http://www.openwall.com/lists/oss-security/2019/09/06/4",
"http://www.openwall.com/lists/oss-security/2019/09/06/5",
"http://www.openwall.com/lists/oss-security/2019/09/06/6",
"http://www.openwall.com/lists/oss-security/2019/09/06/8",
"http://www.openwall.com/lists/oss-security/2019/09/07/1",
"http://www.openwall.com/lists/oss-security/2019/09/07/2",
"http://www.openwall.com/lists/oss-security/2019/09/08/1",
"http://www.openwall.com/lists/oss-security/2019/09/09/1",
"https://exim.org/static/doc/security/CVE-2019-15846.txt",
"https://lists.debian.org/debian-lts-announce/2019/09/msg00004.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FT3GY7V7SR2RHKNZNQCGXFWUSILVSZNU/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDF37AUNETIOXY6ZLQAUBGBVUTMMV242/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SBNHDAF74RI6VK2JVSEIE3VYNL7JJDYM/",
"https://seclists.org/bugtraq/2019/Sep/13",
"https://security.gentoo.org/glsa/201909-06",
"https://usn.ubuntu.com/4124-1/",
"https://usn.ubuntu.com/4124-2/",
"https://www.debian.org/security/2019/dsa-4517",
"https://www.kb.cert.org/vuls/id/672565",
"https://www.openwall.com/lists/oss-security/2019/09/06/1"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim before 4.92.2 allows remote attackers to execute arbitrary code as root via a trailing backslash.",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2455": {
"id": "CVE-2019-2455",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106628",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106628",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2481": {
"id": "CVE-2019-2481",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2503": {
"id": "CVE-2019-2503",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106626",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106626",
"https://access.redhat.com/errata/RHSA-2019:1258",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 6.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2529": {
"id": "CVE-2019-2529",
"references": [
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/",
"http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
"http://www.securityfocus.com/bid/106619",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
"https://security.gentoo.org/glsa/201908-24",
"https://security.netapp.com/advisory/ntap-20190118-0002/",
"https://usn.ubuntu.com/3867-1/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2614": {
"id": "CVE-2019-2614",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://support.f5.com/csp/article/K52514501",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://support.f5.com/csp/article/K52514501",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 4.4,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2627": {
"id": "CVE-2019-2627",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://support.f5.com/csp/article/K32798641",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
"http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"https://access.redhat.com/errata/RHSA-2019:2327",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://support.f5.com/csp/article/K32798641",
"https://usn.ubuntu.com/3957-1/",
"https://usn.ubuntu.com/3957-2/",
"https://usn.ubuntu.com/3957-3/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2737": {
"id": "CVE-2019-2737",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2739": {
"id": "CVE-2019-2739",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K51272092",
"https://support.f5.com/csp/article/K51272092?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 5.1,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2740": {
"id": "CVE-2019-2740",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K03444640",
"https://support.f5.com/csp/article/K03444640?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K03444640",
"https://support.f5.com/csp/article/K03444640?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2805": {
"id": "CVE-2019-2805",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K04831884",
"https://support.f5.com/csp/article/K04831884?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
"http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
"https://access.redhat.com/errata/RHSA-2019:2484",
"https://access.redhat.com/errata/RHSA-2019:2511",
"https://access.redhat.com/errata/RHSA-2019:3708",
"https://seclists.org/bugtraq/2019/Aug/1",
"https://support.f5.com/csp/article/K04831884",
"https://support.f5.com/csp/article/K04831884?utm_source=f5support&%3Butm_medium=RSS",
"https://usn.ubuntu.com/4070-1/",
"https://usn.ubuntu.com/4070-2/",
"https://usn.ubuntu.com/4070-3/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-2974": {
"id": "CVE-2019-2974",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20191017-0002/",
"https://usn.ubuntu.com/4195-1/",
"https://usn.ubuntu.com/4195-2/",
"http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
"http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20191017-0002/",
"https://usn.ubuntu.com/4195-1/",
"https://usn.ubuntu.com/4195-2/"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2019-6109": {
"id": "CVE-2019-6109",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 6.8,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"weakness": "CWE-116"
},
"CVE-2019-6110": {
"id": "CVE-2019-6110",
"references": [
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://www.exploit-db.com/exploits/46193/"
],
"score": 6.8,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"weakness": "CWE-838"
},
"CVE-2019-6111": {
"id": "CVE-2019-6111",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/1",
"http://www.openwall.com/lists/oss-security/2022/08/02/1",
"http://www.securityfocus.com/bid/106741",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://usn.ubuntu.com/3885-2/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.exploit-db.com/exploits/46193/",
"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
"http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
"http://www.openwall.com/lists/oss-security/2019/04/18/1",
"http://www.openwall.com/lists/oss-security/2022/08/02/1",
"http://www.securityfocus.com/bid/106741",
"https://access.redhat.com/errata/RHSA-2019:3702",
"https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
"https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
"https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
"https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
"https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
"https://security.gentoo.org/glsa/201903-16",
"https://security.netapp.com/advisory/ntap-20190213-0001/",
"https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
"https://usn.ubuntu.com/3885-1/",
"https://usn.ubuntu.com/3885-2/",
"https://www.debian.org/security/2019/dsa-4387",
"https://www.exploit-db.com/exploits/46193/",
"https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
"https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-22"
},
"CVE-2020-12783": {
"id": "CVE-2020-12783",
"references": [
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"https://bugs.exim.org/show_bug.cgi?id=2571",
"https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
"https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
"https://usn.ubuntu.com/4366-1/",
"https://www.debian.org/security/2020/dsa-4687",
"http://www.openwall.com/lists/oss-security/2021/05/04/7",
"https://bugs.exim.org/show_bug.cgi?id=2571",
"https://git.exim.org/exim.git/commit/57aa14b216432be381b6295c312065b2fd034f86",
"https://git.exim.org/exim.git/commit/a04174dc2a84ae1008c23b6a7109e7fa3fb7b8b0",
"https://lists.debian.org/debian-lts-announce/2020/05/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F6IQQ2SERFUD4WMRSX6XYDNK7Q4GPT7Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7Z5UG6ZIG32V7M4PP3BCC65C27EWK7G/",
"https://usn.ubuntu.com/4366-1/",
"https://www.debian.org/security/2020/dsa-4687"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim through 4.93 has an out-of-bounds read in the SPA authenticator that could result in SPA/NTLM authentication bypass in auths/spa.c and auths/auth-spa.c.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2020-14145": {
"id": "CVE-2020-14145",
"references": [
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
"http://www.openwall.com/lists/oss-security/2020/12/02/1",
"https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
"https://docs.ssh-mitm.at/CVE-2020-14145.html",
"https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
"https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
"https://security.gentoo.org/glsa/202105-35",
"https://security.netapp.com/advisory/ntap-20200709-0004/",
"https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-203"
},
"CVE-2020-14550": {
"id": "CVE-2020-14550",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://usn.ubuntu.com/4441-1/",
"https://www.oracle.com/security-alerts/cpujul2020.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://usn.ubuntu.com/4441-1/",
"https://www.oracle.com/security-alerts/cpujul2020.html"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-15778": {
"id": "CVE-2020-15778",
"references": [
"https://access.redhat.com/errata/RHSA-2024:3166",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://security.gentoo.org/glsa/202212-06",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html",
"https://access.redhat.com/errata/RHSA-2024:3166",
"https://github.com/cpandya2909/CVE-2020-15778/",
"https://news.ycombinator.com/item?id=25005567",
"https://security.gentoo.org/glsa/202212-06",
"https://security.netapp.com/advisory/ntap-20200731-0007/",
"https://www.openssh.com/security.html"
],
"score": 7.4,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
"vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"weakness": "CWE-78"
},
"CVE-2020-2574": {
"id": "CVE-2020-2574",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
"http://www.openwall.com/lists/oss-security/2020/09/29/1",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200122-0002/",
"https://usn.ubuntu.com/4250-1/",
"https://usn.ubuntu.com/4250-2/",
"https://www.oracle.com/security-alerts/cpujan2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
"http://www.openwall.com/lists/oss-security/2020/09/29/1",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200122-0002/",
"https://usn.ubuntu.com/4250-1/",
"https://usn.ubuntu.com/4250-2/",
"https://www.oracle.com/security-alerts/cpujan2020.html"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-2752": {
"id": "CVE-2020-2752",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 5.3,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-2780": {
"id": "CVE-2020-2780",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 6.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-28007": {
"id": "CVE-2020-28007",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the log directory (owned by a non-root user), a symlink or hard link attack allows overwriting critical root-owned files anywhere on the filesystem.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-59"
},
"CVE-2020-28008": {
"id": "CVE-2020-28008",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28008-SPDIR.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. Because Exim operates as root in the spool directory (owned by a non-root user), an attacker can write to a /var/spool/exim4/input spool header file, in which a crafted recipient address can indirectly lead to command execution.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-269"
},
"CVE-2020-28009": {
"id": "CVE-2020-28009",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28009-STDIN.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-28010": {
"id": "CVE-2020-28010",
"references": [
"http://www.openwall.com/lists/oss-security/2021/07/22/7",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt",
"http://www.openwall.com/lists/oss-security/2021/07/22/7",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28010-SLCWD.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Out-of-bounds Write because the main function, while setuid root, copies the current working directory pathname into a buffer that is too small (on some common platforms).",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28011": {
"id": "CVE-2020-28011",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28011-SPRSS.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow in queue_run via two sender options: -R and -S. This may cause privilege escalation from exim to root.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28012": {
"id": "CVE-2020-28012",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28012-CLOSE.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Exposure of File Descriptor to Unintended Control Sphere because rda_interpret uses a privileged pipe that lacks a close-on-exec flag.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-28013": {
"id": "CVE-2020-28013",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28013-PFPSN.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Heap-based Buffer Overflow because it mishandles \"-F '.('\" on the command line, and thus may allow privilege escalation from any user to root. This occurs because of the interpretation of negative sizes in strncpy.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28014": {
"id": "CVE-2020-28014",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28014-PIDFP.txt"
],
"score": 6.1,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim 4 before 4.94.2 allows Execution with Unnecessary Privileges. The -oP option is available to the exim user, and allows a denial of service because root-owned files can be overwritten.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"weakness": "CWE-269"
},
"CVE-2020-28015": {
"id": "CVE-2020-28015",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28015-NLEND.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. Local users can alter the behavior of root processes because a recipient address can have a newline character.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-28016": {
"id": "CVE-2020-28016",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28016-PFPZA.txt"
],
"score": 7.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows an off-by-two Out-of-bounds Write because \"-F ''\" is mishandled by parse_fix_phrase.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28017": {
"id": "CVE-2020-28017",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28017-RCPTL.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow in receive_add_recipient via an e-mail message with fifty million recipients. NOTE: remote exploitation may be difficult because of resource consumption.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-28019": {
"id": "CVE-2020-28019",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28019-BDATA.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 has Improper Initialization that can lead to recursion-based stack consumption or other consequences. This occurs because use of certain getc functions is mishandled when a client uses BDAT instead of DATA.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-665"
},
"CVE-2020-28020": {
"id": "CVE-2020-28020",
"references": [
"http://www.openwall.com/lists/oss-security/2021/07/25/1",
"http://www.openwall.com/lists/oss-security/2021/08/03/1",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt",
"http://www.openwall.com/lists/oss-security/2021/07/25/1",
"http://www.openwall.com/lists/oss-security/2021/08/03/1",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28020-HSIZE.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.92 allows Integer Overflow to Buffer Overflow, in which an unauthenticated remote attacker can execute arbitrary code by leveraging the mishandling of continuation lines during header-length restriction.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2020-28021": {
"id": "CVE-2020-28021",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28021-MAUTH.txt"
],
"score": 8.8,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters. An authenticated remote SMTP client can insert newline characters into a spool file (which indirectly leads to remote code execution as root) via AUTH= in a MAIL FROM command.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-28022": {
"id": "CVE-2020-28022",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28022-EXOPT.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 has Improper Restriction of Write Operations within the Bounds of a Memory Buffer. This occurs when processing name=value pairs within MAIL FROM and RCPT TO commands.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28023": {
"id": "CVE-2020-28023",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28023-SCHAD.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read. smtp_setup_msg may disclose sensitive information from process memory to an unauthenticated SMTP client.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2020-28024": {
"id": "CVE-2020-28024",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28024-UNGET.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 allows Buffer Underwrite that may result in unauthenticated remote attackers executing arbitrary commands, because smtp_ungetc was only intended to push back characters, but can actually push back non-character error codes such as EOF.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2020-28025": {
"id": "CVE-2020-28025",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28025-BHASH.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim 4 before 4.94.2 allows Out-of-bounds Read because pdkim_finish_bodyhash does not validate the relationship between sig->bodyhash.len and b->bh.len; thus, a crafted DKIM-Signature header might lead to a leak of sensitive information from process memory.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2020-28026": {
"id": "CVE-2020-28026",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28026-FGETS.txt"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim 4 before 4.94.2 has Improper Neutralization of Line Delimiters, relevant in non-default configurations that enable Delivery Status Notification (DSN). Certain uses of ORCPT= can place a newline into a spool header file, and indirectly allow unauthenticated remote attackers to execute arbitrary commands as root.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-2812": {
"id": "CVE-2020-2812",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
"https://security.gentoo.org/glsa/202012-08",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 4.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-28912": {
"id": "CVE-2020-28912",
"references": [
"https://hackerone.com/reports/1019891",
"https://jira.mariadb.org/browse/MDEV-24040",
"https://hackerone.com/reports/1019891",
"https://jira.mariadb.org/browse/MDEV-24040"
],
"score": 7,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2020-2922": {
"id": "CVE-2020-2922",
"references": [
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20200416-0003/",
"https://usn.ubuntu.com/4350-1/",
"https://www.oracle.com/security-alerts/cpuapr2020.html"
],
"score": 3.7,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2020-8015": {
"id": "CVE-2020-8015",
"references": [
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
"https://bugzilla.suse.com/show_bug.cgi?id=1154183",
"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00010.html",
"https://bugzilla.suse.com/show_bug.cgi?id=1154183"
],
"score": 8.4,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "A UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of exim in openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: openSUSE Factory exim versions prior to 4.93.0.4-3.1.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-59"
},
"CVE-2021-2007": {
"id": "CVE-2021-2007",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 3.7,
"services": [
"3306/mysql"
],
"severity": "low",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-2011": {
"id": "CVE-2021-2011",
"references": [
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
"https://security.gentoo.org/glsa/202105-27",
"https://security.netapp.com/advisory/ntap-20210622-0001/",
"https://www.oracle.com/security-alerts/cpujan2021.html"
],
"score": 5.9,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-2144": {
"id": "CVE-2021-2144",
"references": [
"https://security.netapp.com/advisory/ntap-20210513-0002/",
"https://www.oracle.com/security-alerts/cpuapr2021.html",
"https://security.netapp.com/advisory/ntap-20210513-0002/",
"https://www.oracle.com/security-alerts/cpuapr2021.html"
],
"score": 7.2,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-27216": {
"id": "CVE-2021-27216",
"references": [
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt",
"https://www.exim.org/static/doc/security/CVE-2020-qualys/CVE-2020-28007-LFDIR.txt"
],
"score": 6.3,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim 4 before 4.94.2 has Execution with Unnecessary Privileges. By leveraging a delete_pid_file race condition, a local user can delete arbitrary files as root. This involves the -oP and -oPX options.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"weakness": "CWE-362"
},
"CVE-2021-36368": {
"id": "CVE-2021-36368",
"references": [
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html",
"https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
"https://docs.ssh-mitm.at/trivialauth.html",
"https://github.com/openssh/openssh-portable/pull/258",
"https://security-tracker.debian.org/tracker/CVE-2021-36368",
"https://www.openssh.com/security.html"
],
"score": 3.7,
"services": [
"22/ssh"
],
"severity": "low",
"summary": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-287"
},
"CVE-2021-38371": {
"id": "CVE-2021-38371",
"references": [
"https://nostarttls.secvuln.info",
"https://www.exim.org",
"https://www.exim.org/static/doc/security/CVE-2021-38371.txt",
"https://nostarttls.secvuln.info",
"https://www.exim.org",
"https://www.exim.org/static/doc/security/CVE-2021-38371.txt"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-74"
},
"CVE-2021-41617": {
"id": "CVE-2021-41617",
"references": [
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220805-0001/",
"https://www.tenable.com/plugins/nessus/154174",
"https://bugzilla.suse.com/show_bug.cgi?id=1190975",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
"https://security.netapp.com/advisory/ntap-20211014-0004/",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-8.8",
"https://www.openwall.com/lists/oss-security/2021/09/26/1",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html",
"https://www.starwindsoftware.com/security/sw-20220805-0001/",
"https://www.tenable.com/plugins/nessus/154174"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
},
"CVE-2021-46659": {
"id": "CVE-2021-46659",
"references": [
"https://jira.mariadb.org/browse/MDEV-25631",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220311-0003/",
"https://jira.mariadb.org/browse/MDEV-25631",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220311-0003/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2021-46666": {
"id": "CVE-2021-46666",
"references": [
"https://jira.mariadb.org/browse/MDEV-25635",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/",
"https://jira.mariadb.org/browse/MDEV-25635",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-617"
},
"CVE-2021-46667": {
"id": "CVE-2021-46667",
"references": [
"https://jira.mariadb.org/browse/MDEV-26350",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/",
"https://jira.mariadb.org/browse/MDEV-26350",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2021-46669": {
"id": "CVE-2021-46669",
"references": [
"https://jira.mariadb.org/browse/MDEV-25638",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/",
"https://jira.mariadb.org/browse/MDEV-25638",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
"https://mariadb.com/kb/en/security/",
"https://security.netapp.com/advisory/ntap-20220221-0002/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-416"
},
"CVE-2022-27385": {
"id": "CVE-2022-27385",
"references": [
"https://jira.mariadb.org/browse/MDEV-26415",
"https://security.netapp.com/advisory/ntap-20220526-0008/",
"https://jira.mariadb.org/browse/MDEV-26415",
"https://security.netapp.com/advisory/ntap-20220526-0008/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-89"
},
"CVE-2022-27449": {
"id": "CVE-2022-27449",
"references": [
"https://jira.mariadb.org/browse/MDEV-28089",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220526-0006/",
"https://jira.mariadb.org/browse/MDEV-28089",
"https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
"https://security.netapp.com/advisory/ntap-20220526-0006/"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2022-31621": {
"id": "CVE-2022-31621",
"references": [
"https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-31622": {
"id": "CVE-2022-31622",
"references": [
"https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-31623": {
"id": "CVE-2022-31623",
"references": [
"https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
"https://github.com/MariaDB/server/pull/1938",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
"https://github.com/MariaDB/server/pull/1938",
"https://jira.mariadb.org/browse/MDEV-26561",
"https://jira.mariadb.org/browse/MDEV-26574",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-31624": {
"id": "CVE-2022-31624",
"references": [
"https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
"https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/",
"https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
"https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
"https://security.netapp.com/advisory/ntap-20220707-0006/"
],
"score": 5.5,
"services": [
"3306/mysql"
],
"severity": "medium",
"summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-667"
},
"CVE-2022-3424": {
"id": "CVE-2022-3424",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html",
"https://bugzilla.redhat.com/show_bug.cgi?id=2132640",
"https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz%40163.com/",
"https://security.netapp.com/advisory/ntap-20230406-0005/",
"https://www.spinics.net/lists/kernel/msg4518970.html"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s SGI GRU driver in the way the first gru_file_unlocked_ioctl function is called by the user, where a fail pass occurs in the gru_check_chiplet_assignment function. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2022-3707": {
"id": "CVE-2022-3707",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2137979",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz%40163.com/"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "A double-free memory flaw was found in the Linux kernel. The Intel GVT-g graphics driver triggers VGA card system resource overload, causing a fail in the intel_gvt_dma_map_guest_page function. This issue could allow a local user to crash the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-460"
},
"CVE-2022-37451": {
"id": "CVE-2022-37451",
"references": [
"https://cwe.mitre.org/data/definitions/762.html",
"https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
"https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_invalid_free",
"https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/1",
"https://cwe.mitre.org/data/definitions/762.html",
"https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42",
"https://github.com/Exim/exim/compare/exim-4.95...exim-4.96",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_invalid_free",
"https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LETR5CVDPFOFQHXCJP6NFLG52JZHQYDY/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XSWDF4QEXD4TDWQLYQOWCHBJKTDQR4Z7/",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/1"
],
"score": 7.5,
"services": [
"465/smtp"
],
"severity": "high",
"summary": "Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-763"
},
"CVE-2022-37452": {
"id": "CVE-2022-37452",
"references": [
"https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
"https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_overflow",
"https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/8",
"https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743",
"https://github.com/Exim/exim/compare/exim-4.94...exim-4.95",
"https://github.com/Exim/exim/wiki/EximSecurity",
"https://github.com/ivd38/exim_overflow",
"https://lists.debian.org/debian-lts-announce/2022/08/msg00014.html",
"https://www.exim.org/static/doc/security/",
"https://www.openwall.com/lists/oss-security/2022/08/06/8"
],
"score": 9.8,
"services": [
"465/smtp"
],
"severity": "critical",
"summary": "Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2023-0030": {
"id": "CVE-2023-0030",
"references": [
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270",
"https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10",
"https://security.netapp.com/advisory/ntap-20230413-0010/",
"https://bugzilla.redhat.com/show_bug.cgi?id=2157270"
],
"score": 7.8,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A use-after-free flaw was found in the Linux kernel’s nouveau driver in how a user triggers a memory overflow that causes the nvkm_vma_tail function to fail. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-416"
},
"CVE-2023-1390": {
"id": "CVE-2023-1390",
"references": [
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/",
"https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5",
"https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6",
"https://infosec.exchange/%40_mattata/109427999461122360",
"https://security.netapp.com/advisory/ntap-20230420-0001/"
],
"score": 7.5,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-1050"
},
"CVE-2023-28466": {
"id": "CVE-2023-28466",
"references": [
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/",
"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962",
"https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"https://security.netapp.com/advisory/ntap-20230427-0006/"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference).",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-476"
},
"CVE-2023-38408": {
"id": "CVE-2023-38408",
"references": [
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
"http://www.openwall.com/lists/oss-security/2023/07/20/1",
"http://www.openwall.com/lists/oss-security/2023/07/20/2",
"http://www.openwall.com/lists/oss-security/2023/09/22/11",
"http://www.openwall.com/lists/oss-security/2023/09/22/9",
"https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
"https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
"https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
"https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
"https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
"https://news.ycombinator.com/item?id=36790196",
"https://security.gentoo.org/glsa/202307-01",
"https://security.netapp.com/advisory/ntap-20230803-0010/",
"https://support.apple.com/kb/HT213940",
"https://www.openssh.com/security.html",
"https://www.openssh.com/txt/release-9.3p2",
"https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
"https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
],
"score": 9.8,
"services": [
"22/ssh"
],
"severity": "critical",
"summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-428"
},
"CVE-2023-48795": {
"id": "CVE-2023-48795",
"references": [
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/18/3",
"http://www.openwall.com/lists/oss-security/2023/12/19/5",
"http://www.openwall.com/lists/oss-security/2023/12/20/3",
"http://www.openwall.com/lists/oss-security/2024/03/06/3",
"http://www.openwall.com/lists/oss-security/2024/04/17/8",
"https://access.redhat.com/security/cve/cve-2023-48795",
"https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
"https://bugs.gentoo.org/920280",
"https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
"https://bugzilla.suse.com/show_bug.cgi?id=1217950",
"https://crates.io/crates/thrussh/versions",
"https://filezilla-project.org/versions.php",
"https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
"https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
"https://github.com/NixOS/nixpkgs/pull/275249",
"https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
"https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
"https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
"https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
"https://github.com/advisories/GHSA-45x7-px36-x8w8",
"https://github.com/apache/mina-sshd/issues/445",
"https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
"https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
"https://github.com/cyd01/KiTTY/issues/520",
"https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
"https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
"https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
"https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
"https://github.com/hierynomus/sshj/issues/916",
"https://github.com/janmojzis/tinyssh/issues/81",
"https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
"https://github.com/libssh2/libssh2/pull/1291",
"https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
"https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
"https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
"https://github.com/mwiede/jsch/issues/457",
"https://github.com/mwiede/jsch/pull/461",
"https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
"https://github.com/openssh/openssh-portable/commits/master",
"https://github.com/paramiko/paramiko/issues/2337",
"https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
"https://github.com/proftpd/proftpd/issues/456",
"https://github.com/rapier1/hpn-ssh/releases",
"https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
"https://github.com/ronf/asyncssh/tags",
"https://github.com/ssh-mitm/ssh-mitm/issues/165",
"https://github.com/warp-tech/russh/releases/tag/v0.40.2",
"https://gitlab.com/libssh/libssh-mirror/-/tags",
"https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
"https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
"https://help.panic.com/releasenotes/transmit5/",
"https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
"https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
"https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html",
"https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html",
"https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
"https://matt.ucc.asn.au/dropbear/CHANGES",
"https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
"https://news.ycombinator.com/item?id=38684904",
"https://news.ycombinator.com/item?id=38685286",
"https://news.ycombinator.com/item?id=38732005",
"https://nova.app/releases/#v11.8",
"https://oryx-embedded.com/download/#changelog",
"https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
"https://roumenpetrov.info/secsh/#news20231220",
"https://security-tracker.debian.org/tracker/CVE-2023-48795",
"https://security-tracker.debian.org/tracker/source-package/libssh2",
"https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
"https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
"https://security.gentoo.org/glsa/202312-16",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0004/",
"https://support.apple.com/kb/HT214084",
"https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
"https://twitter.com/TrueSkrillor/status/1736774389725565005",
"https://ubuntu.com/security/CVE-2023-48795",
"https://winscp.net/eng/docs/history#6.2.2",
"https://www.bitvise.com/ssh-client-version-history#933",
"https://www.bitvise.com/ssh-server-version-history",
"https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
"https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.debian.org/security/2023/dsa-5588",
"https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
"https://www.netsarang.com/en/xshell-update-history/",
"https://www.openssh.com/openbsd.html",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"https://www.openwall.com/lists/oss-security/2023/12/20/3",
"https://www.paramiko.org/changelog.html",
"https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
"https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
"https://www.terrapin-attack.com",
"https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
"https://www.vandyke.com/products/securecrt/history.txt",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
"https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
],
"score": 5.9,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-354"
},
"CVE-2023-51384": {
"id": "CVE-2023-51384",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 5.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2023-51385": {
"id": "CVE-2023-51385",
"references": [
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2",
"http://seclists.org/fulldisclosure/2024/Mar/21",
"http://www.openwall.com/lists/oss-security/2023/12/26/4",
"https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
"https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
"https://security.gentoo.org/glsa/202312-17",
"https://security.netapp.com/advisory/ntap-20240105-0005/",
"https://support.apple.com/kb/HT214084",
"https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"https://www.debian.org/security/2023/dsa-5586",
"https://www.openssh.com/txt/release-9.6",
"https://www.openwall.com/lists/oss-security/2023/12/18/2"
],
"score": 6.5,
"services": [
"22/ssh"
],
"severity": "medium",
"summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"weakness": "CWE-78"
},
"CVE-2023-5157": {
"id": "CVE-2023-5157",
"references": [
"https://access.redhat.com/errata/RHSA-2023:5259",
"https://access.redhat.com/errata/RHSA-2023:5683",
"https://access.redhat.com/errata/RHSA-2023:5684",
"https://access.redhat.com/errata/RHSA-2023:6821",
"https://access.redhat.com/errata/RHSA-2023:6822",
"https://access.redhat.com/errata/RHSA-2023:6883",
"https://access.redhat.com/errata/RHSA-2023:7633",
"https://access.redhat.com/security/cve/CVE-2023-5157",
"https://bugzilla.redhat.com/show_bug.cgi?id=2240246",
"https://access.redhat.com/errata/RHSA-2023:5683",
"https://access.redhat.com/errata/RHSA-2023:5684",
"https://access.redhat.com/errata/RHSA-2023:6821",
"https://access.redhat.com/errata/RHSA-2023:6822",
"https://access.redhat.com/errata/RHSA-2023:6883",
"https://access.redhat.com/errata/RHSA-2023:7633",
"https://access.redhat.com/security/cve/CVE-2023-5157",
"https://bugzilla.redhat.com/show_bug.cgi?id=2240246"
],
"score": 7.5,
"services": [
"3306/mysql"
],
"severity": "high",
"summary": "A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-400"
},
"CVE-2023-51766": {
"id": "CVE-2023-51766",
"references": [
"http://www.openwall.com/lists/oss-security/2023/12/24/1",
"http://www.openwall.com/lists/oss-security/2023/12/25/1",
"http://www.openwall.com/lists/oss-security/2023/12/29/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/1",
"http://www.openwall.com/lists/oss-security/2024/01/01/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/3",
"https://bugs.exim.org/show_bug.cgi?id=3063",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
"https://exim.org/static/doc/security/CVE-2023-51766.txt",
"https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
"https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
"https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
"https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
"https://lwn.net/Articles/956533/",
"https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
"https://www.openwall.com/lists/oss-security/2023/12/23/2",
"https://www.youtube.com/watch?v=V8KPV96g1To",
"http://www.openwall.com/lists/oss-security/2023/12/24/1",
"http://www.openwall.com/lists/oss-security/2023/12/25/1",
"http://www.openwall.com/lists/oss-security/2023/12/29/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/1",
"http://www.openwall.com/lists/oss-security/2024/01/01/2",
"http://www.openwall.com/lists/oss-security/2024/01/01/3",
"https://bugs.exim.org/show_bug.cgi?id=3063",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255852",
"https://exim.org/static/doc/security/CVE-2023-51766.txt",
"https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html",
"https://git.exim.org/exim.git/commit/5bb786d5ad568a88d50d15452aacc8404047e5ca",
"https://git.exim.org/exim.git/commit/cf1376206284f2a4f11e32d931d4aade34c206c5",
"https://github.com/Exim/exim/blob/master/doc/doc-txt/cve-2023-51766",
"https://lists.debian.org/debian-lts-announce/2024/01/msg00002.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORN7OKEQPPBKUHYRQ6LR5PSNBQVDHAWB/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPDWHJPABVJCXDSNELSSVTIVAJU2MDUQ/",
"https://lwn.net/Articles/956533/",
"https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/",
"https://www.openwall.com/lists/oss-security/2023/12/23/2",
"https://www.youtube.com/watch?v=V8KPV96g1To"
],
"score": 5.3,
"services": [
"465/smtp"
],
"severity": "medium",
"summary": "Exim before 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Exim supports <LF>.<CR><LF> but some other popular e-mail servers do not.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-345"
},
"CVE-2023-51767": {
"id": "CVE-2023-51767",
"references": [
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767",
"https://www.openwall.com/lists/oss-security/2025/09/22/1",
"http://www.openwall.com/lists/oss-security/2025/09/22/1",
"http://www.openwall.com/lists/oss-security/2025/09/22/2",
"http://www.openwall.com/lists/oss-security/2025/09/23/4",
"http://www.openwall.com/lists/oss-security/2025/09/24/4",
"http://www.openwall.com/lists/oss-security/2025/10/01/1",
"https://access.redhat.com/security/cve/CVE-2023-51767",
"https://arxiv.org/abs/2309.02545",
"https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
"https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
"https://security.netapp.com/advisory/ntap-20240125-0006/",
"https://ubuntu.com/security/CVE-2023-51767"
],
"score": 7,
"services": [
"22/ssh"
],
"severity": "high",
"summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
"vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-Other"
}
}
}