Odin HomeODIN logoODIN logo
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

182.23.161.86

SummaryCVE DetailsRaw Data
17 Nov 2025, 05:58:33 UTC
{
  "scan_id": 1763188993,
  "ip": "182.23.161.86",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "182.23.160.0/22",
    "postal_code": "",
    "coordinates": {
      "latitude": "-6.175",
      "longitude": "106.8286"
    },
    "geo_point": "-6.175, 106.8286",
    "locale_code": "en",
    "continent": "Asia",
    "country_code": "ID",
    "country_name": "Indonesia",
    "city": ""
  },
  "location_updated_at": "2025-11-14T00:43:10Z",
  "asn": {
    "number": "AS38496",
    "organization": "PT Cyber Network Indonesia",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "182.23.161.0/24",
    "organization": "Route Object PT. Cyber Network Indonesia",
    "descr": "Route Object PT. Cyber Network Indonesia,\nInternet Service Provider,\nJakarta",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:27:00Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-11-14T00:43:10Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-11-14T03:22:24Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-11-14T00:43:10Z"
    }
  ],
  "hostnames": [
    {
      "name": "86.161.23.182.cni.net.id",
      "last_updated_at": "2025-11-17T06:06:16.663846404Z"
    }
  ],
  "services": [
    {
      "port": 22,
      "protocol": "tcp",
      "name": "ssh",
      "version": "7.4",
      "product": "OpenSSH",
      "extra_info": "protocol 2.0",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:openbsd:openssh:7.4",
          "part": "a",
          "vendor": "openbsd",
          "product": "openssh",
          "version": "7\\.4",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ssh": {
          "banner": "SSH-2.0-OpenSSH_7.4",
          "client_to_server_ciphers": [
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "[email protected]",
            "[email protected]",
            "aes128-cbc",
            "aes192-cbc",
            "aes256-cbc",
            "blowfish-cbc",
            "cast128-cbc",
            "3des-cbc"
          ],
          "client_to_server_compression": [
            "none",
            "[email protected]"
          ],
          "client_to_server_macs": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1"
          ],
          "host_key_algorithms": [
            "ssh-rsa",
            "rsa-sha2-512",
            "rsa-sha2-256",
            "ecdsa-sha2-nistp256",
            "ssh-ed25519"
          ],
          "kex_algorithms": [
            "curve25519-sha256",
            "[email protected]",
            "ecdh-sha2-nistp256",
            "ecdh-sha2-nistp384",
            "ecdh-sha2-nistp521",
            "diffie-hellman-group-exchange-sha256",
            "diffie-hellman-group16-sha512",
            "diffie-hellman-group18-sha512",
            "diffie-hellman-group-exchange-sha1",
            "diffie-hellman-group14-sha256",
            "diffie-hellman-group14-sha1",
            "diffie-hellman-group1-sha1"
          ],
          "key": {
            "algorithm": "ecdsa-sha2-nistp256",
            "fingerprint_sha256": "e275967f5bf670fb5f57a65f6e6746b605de5e18f11b5234963ef9e160e78032"
          },
          "server_to_client_ciphers": [
            "[email protected]",
            "aes128-ctr",
            "aes192-ctr",
            "aes256-ctr",
            "[email protected]",
            "[email protected]",
            "aes128-cbc",
            "aes192-cbc",
            "aes256-cbc",
            "blowfish-cbc",
            "cast128-cbc",
            "3des-cbc"
          ],
          "server_to_client_compression": [
            "none",
            "[email protected]"
          ],
          "server_to_client_macs": [
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "[email protected]",
            "hmac-sha2-256",
            "hmac-sha2-512",
            "hmac-sha1"
          ],
          "software": "OpenSSH_7.4",
          "version": "2.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2007-2768",
          "severity": "medium"
        },
        {
          "id": "CVE-2008-3844",
          "severity": "high"
        },
        {
          "id": "CVE-2016-20012",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-12T19:50:58.304Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.6",
      "product": "Apache httpd",
      "extra_info": "(CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.34",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.6",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.6",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -960183165,
          "body_sha256": "955fe64c542f01d24170d3a4dff5de6abe58d4cbb691a665fa73ccfe48c64ec1",
          "component": [
            "CentOS",
            "OpenSSL:1.0.2k",
            "Apache HTTP Server:2.4.6",
            "PHP:7.2.34"
          ],
          "content_length": 2934,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "2934"
            ],
            "content_type": [
              "text/html; charset=UTF-8"
            ],
            "date": [
              "Fri, 14 Nov 2025 14:49:07 GMT"
            ],
            "etag": [
              "\"b76-5fb507bb188fc\""
            ],
            "last_modified": [
              "Wed, 10 May 2023 05:52:54 GMT"
            ],
            "server": [
              "Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.34"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200
        }
      },
      "cve": [
        {
          "id": "CVE-2006-20001",
          "severity": "high"
        },
        {
          "id": "CVE-2013-4352",
          "severity": "medium"
        },
        {
          "id": "CVE-2013-5704",
          "severity": "medium"
        }
      ],
      "url": "http://182.23.161.86/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-14T14:49:07.985Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "2.4.6",
      "product": "Apache httpd",
      "extra_info": "(CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.34",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:apache:http_server:2.4.6",
          "part": "a",
          "vendor": "apache",
          "product": "http_server",
          "version": "2\\.4\\.6",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 27208360,
          "body_sha256": "63e5c6a15d1d01c9d7344e59600fe185f75843253a7ebfe892184661ee32cc7d",
          "component": [
            "CentOS",
            "PHP:7.2.34",
            "OpenSSL:1.0.2k",
            "Apache HTTP Server:2.4.6"
          ],
          "content_length": 102,
          "headers": {
            "accept_ranges": [
              "bytes"
            ],
            "content_length": [
              "102"
            ],
            "content_type": [
              "text/html; charset=UTF-8"
            ],
            "date": [
              "Fri, 14 Nov 2025 10:08:07 GMT"
            ],
            "etag": [
              "\"66-6299f70acaad8\""
            ],
            "last_modified": [
              "Thu, 19 Dec 2024 13:23:47 GMT"
            ],
            "server": [
              "Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9 PHP/7.2.34"
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://r3.i.lencr.org/"
                ],
                "ocsp_urls": [
                  "http://r3.o.lencr.org"
                ]
              },
              "authority_key_id": "142eb317b75856cbae500940e61faf9d8b14c2c6",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                }
              ],
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "kalimantan.tbindonesia.or.id"
                ]
              },
              "subject_key_id": "43c4c2465cd2c8e2cdf2b817815e982bb970635b"
            },
            "fingerprint_md5": "7CB7F856EB1CB6959A83FC75C1EDBE99",
            "fingerprint_sha1": "CB2949A17C913376C13A2BB2DB43868FBA1F8072",
            "fingerprint_sha256": "13B01623A796FDAE07CA6F5EF1237A42CFBECC70F93141C264CD84CA34D19A5F",
            "issuer": {
              "common_name": [
                "R3"
              ],
              "country": [
                "US"
              ],
              "organization": [
                "Let's Encrypt"
              ]
            },
            "jarm": "15d2ad16d29d29d00015d2ad15d29d67edd16014aa8d87eb613c543d04cbe2",
            "redacted": false,
            "revocation": {
              "ocsp": {
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "277473089122954121131923626047107082354824",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "48b0e36bdaa647340fe56a02fa9d30eb1c5201cb56dd2c81d9bbbfab39d88473",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3044022060d07fb9ac17d3d5d808c7c9756992c80619281d11e38cb2bc9d544443863605022020efb5195da824188b11e1240a563ae06ced86075f15b7f1633d7ba1c2fafadb"
                },
                "timestamp": "2023-11-28T09:11:44.445000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "76ff883f0ab6fb9551c261ccf587ba34b4a4cdbb29dc68420a9fe6674c5a3a74",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100cec5a04cee9d682c14d5ef4adba08c1df942294d11832aa035e0f719d88438cf022100b7ee1c8997a7a2986f0b3d84fed35c233e6612a4b810b6e8cfea44374881a121"
                },
                "timestamp": "2023-11-28T09:11:44.520000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "kalimantan.tbindonesia.or.id"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "kalimantan.tbindonesia.or.id"
              ],
              "extended_dns_names": [
                {
                  "domain": "tbindonesia",
                  "fld": "tbindonesia.or.id",
                  "subdomain": "kalimantan",
                  "tld": "or.id"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "4adc37515a8868f5b87e3551bffca222cf85ced4da23f0e4d0cbdd646d44719a",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "8baab3970f718aa198f26bb38de597e4026cbd40c6e150f890af708210a2cb68",
            "tbs_noct_fingerprint": "cd4def1c4f12246819960e967da04f4e38d080bb482f897a1c25642983ccf6bf",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 7775999,
              "not_after": "2024-02-26T08:11:43",
              "not_before": "2023-11-28T08:11:44"
            },
            "version": 2
          },
          "fingerprint_sha256": "13B01623A796FDAE07CA6F5EF1237A42CFBECC70F93141C264CD84CA34D19A5F",
          "precert": false,
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "cve": [
        {
          "id": "CVE-2006-20001",
          "severity": "high"
        },
        {
          "id": "CVE-2013-4352",
          "severity": "medium"
        },
        {
          "id": "CVE-2013-5704",
          "severity": "medium"
        }
      ],
      "url": "https://182.23.161.86/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-14T11:54:46.03Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.5.5-10.6.8",
      "product": "MariaDB",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mariadb:mariadb:5.5.5-10.6.8",
          "part": "a",
          "vendor": "mariadb",
          "product": "mariadb",
          "version": "5\\.5\\.5\\-10\\.6\\.8",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_DEPRECATED_EOF": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_SESSION_TRACK": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.5.5-10.6.8-MariaDB"
        }
      },
      "cve": [
        {
          "id": "CVE-2005-0004",
          "severity": "medium"
        },
        {
          "id": "CVE-2012-0540",
          "severity": "medium"
        },
        {
          "id": "CVE-2012-0572",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-11-17T05:58:33.11Z"
    }
  ],
  "services_hash": "34c9fa96986c0e5540a6f3d70b3d42f7f241fe55b273189475d7b485d99fb525",
  "last_updated_at": "2025-11-17T05:58:33.11Z",
  "banner": [
    "mysql",
    "ssh",
    "http",
    "tls"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2005-0004": {
      "id": "CVE-2005-0004",
      "references": [
        "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
        "http://lists.mysql.com/internals/20600",
        "http://marc.info/?l=bugtraq&m=110608297217224&w=2",
        "http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
        "http://secunia.com/advisories/13867",
        "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
        "http://www.debian.org/security/2005/dsa-647",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
        "http://www.securityfocus.com/bid/12277",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/18922",
        "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
        "http://lists.mysql.com/internals/20600",
        "http://marc.info/?l=bugtraq&m=110608297217224&w=2",
        "http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
        "http://secunia.com/advisories/13867",
        "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
        "http://www.debian.org/security/2005/dsa-647",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
        "http://www.securityfocus.com/bid/12277",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/18922"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2006-20001": {
      "id": "CVE-2006-20001",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://security.netapp.com/advisory/ntap-20230316-0005/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2007-2768": {
      "id": "CVE-2007-2768",
      "references": [
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/",
        "http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0635.html",
        "http://www.osvdb.org/34601",
        "https://security.netapp.com/advisory/ntap-20191107-0002/"
      ],
      "score": 4.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH, when using OPIE (One-Time Passwords in Everything) for PAM, allows remote attackers to determine the existence of certain user accounts, which displays a different response if the user account exists and is configured to use one-time passwords (OTP), a similar issue to CVE-2007-2243.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2008-3844": {
      "id": "CVE-2008-3844",
      "references": [
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747",
        "http://secunia.com/advisories/31575",
        "http://secunia.com/advisories/32241",
        "http://securitytracker.com/id?1020730",
        "http://support.avaya.com/elmodocs2/security/ASA-2008-399.htm",
        "http://www.redhat.com/security/data/openssh-blacklist.html",
        "http://www.redhat.com/support/errata/RHSA-2008-0855.html",
        "http://www.securityfocus.com/bid/30794",
        "http://www.vupen.com/english/advisories/2008/2821",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/44747"
      ],
      "score": 9.3,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "Certain Red Hat Enterprise Linux (RHEL) 4 and 5 packages for OpenSSH, as signed in August 2008 using a legitimate Red Hat GPG key, contain an externally introduced modification (Trojan Horse) that allows the package authors to have an unknown impact.  NOTE: since the malicious packages were not distributed from any official Red Hat sources, the scope of this issue is restricted to users who may have obtained these packages through unofficial distribution points.  As of 20080827, no unofficial distributions of this software are known.",
      "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
      "weakness": "CWE-20"
    },
    "CVE-2012-0540": {
      "id": "CVE-2012-0540",
      "references": [
        "http://osvdb.org/83976",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54551",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77061",
        "http://osvdb.org/83976",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54551",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77061"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0572": {
      "id": "CVE-2012-0572",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0574": {
      "id": "CVE-2012-0574",
      "references": [
        "http://marc.info/?l=bugtraq&m=135109152819176&w=2",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266",
        "http://marc.info/?l=bugtraq&m=135109152819176&w=2",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0578": {
      "id": "CVE-2012-0578",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1688": {
      "id": "CVE-2012-1688",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53067",
        "http://www.securitytracker.com/id?1026934",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53067",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1689": {
      "id": "CVE-2012-1689",
      "references": [
        "http://osvdb.org/83980",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54547",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77065",
        "http://osvdb.org/83980",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54547",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77065"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1690": {
      "id": "CVE-2012-1690",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53074",
        "http://www.securitytracker.com/id?1026934",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53074",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1703.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1697": {
      "id": "CVE-2012-1697",
      "references": [
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53064",
        "http://www.securitytracker.com/id?1026934",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53064",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1702": {
      "id": "CVE-2012-1702",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1703": {
      "id": "CVE-2012-1703",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53058",
        "http://www.securitytracker.com/id?1026934",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53058",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1690.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1705": {
      "id": "CVE-2012-1705",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1734": {
      "id": "CVE-2012-1734",
      "references": [
        "http://osvdb.org/83979",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54540",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77064",
        "http://osvdb.org/83979",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54540",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77064"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1735": {
      "id": "CVE-2012-1735",
      "references": [
        "http://osvdb.org/83975",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54549",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77060",
        "http://osvdb.org/83975",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54549",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77060"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1756": {
      "id": "CVE-2012-1756",
      "references": [
        "http://osvdb.org/83978",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54524",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77063",
        "http://osvdb.org/83978",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54524",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77063"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1757": {
      "id": "CVE-2012-1757",
      "references": [
        "http://osvdb.org/83977",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54526",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77062",
        "http://osvdb.org/83977",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54526",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77062"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-2750": {
      "id": "CVE-2012-2750",
      "references": [
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.securityfocus.com/bid/63125",
        "http://www.securitytracker.com/id/1029184",
        "https://bugzilla.redhat.com/show_bug.cgi?id=833742",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.securityfocus.com/bid/63125",
        "http://www.securitytracker.com/id/1029184",
        "https://bugzilla.redhat.com/show_bug.cgi?id=833742"
      ],
      "score": 10,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a \"Security Fix\", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.",
      "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3150": {
      "id": "CVE-2012-3150",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79388",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79388"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3158": {
      "id": "CVE-2012-3158",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79382",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79382"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3160": {
      "id": "CVE-2012-3160",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79394",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79394"
      ],
      "score": 2.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3163": {
      "id": "CVE-2012-3163",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/56509",
        "http://secunia.com/advisories/56513",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79381",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/56509",
        "http://secunia.com/advisories/56513",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79381"
      ],
      "score": 9,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3166": {
      "id": "CVE-2012-3166",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3167": {
      "id": "CVE-2012-3167",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79392",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79392"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3173": {
      "id": "CVE-2012-3173",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79386",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79386"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3177": {
      "id": "CVE-2012-3177",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79383",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79383"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3180": {
      "id": "CVE-2012-3180",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79389",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79389"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3197": {
      "id": "CVE-2012-3197",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79393",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79393"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5060": {
      "id": "CVE-2012-5060",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5096": {
      "id": "CVE-2012-5096",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5612": {
      "id": "CVE-2012-5612",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
        "http://seclists.org/fulldisclosure/2012/Dec/5",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.exploit-db.com/exploits/23076",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://mariadb.atlassian.net/browse/MDEV-3908",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960",
        "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
        "http://seclists.org/fulldisclosure/2012/Dec/5",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.exploit-db.com/exploits/23076",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://mariadb.atlassian.net/browse/MDEV-3908",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-787"
    },
    "CVE-2012-5614": {
      "id": "CVE-2012-5614",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://seclists.org/fulldisclosure/2012/Dec/7",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://www.securitytracker.com/id?1027829",
        "https://bugzilla.redhat.com/show_bug.cgi?id=882607",
        "https://mariadb.atlassian.net/browse/MDEV-3910",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://seclists.org/fulldisclosure/2012/Dec/7",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://www.securitytracker.com/id?1027829",
        "https://bugzilla.redhat.com/show_bug.cgi?id=882607",
        "https://mariadb.atlassian.net/browse/MDEV-3910"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5627": {
      "id": "CVE-2012-5627",
      "references": [
        "http://seclists.org/fulldisclosure/2012/Dec/58",
        "http://seclists.org/fulldisclosure/2012/Dec/83",
        "http://seclists.org/oss-sec/2012/q4/424",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "https://bugzilla.redhat.com/show_bug.cgi?id=883719",
        "https://mariadb.atlassian.net/browse/MDEV-3915",
        "http://seclists.org/fulldisclosure/2012/Dec/58",
        "http://seclists.org/fulldisclosure/2012/Dec/83",
        "http://seclists.org/oss-sec/2012/q4/424",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "https://bugzilla.redhat.com/show_bug.cgi?id=883719",
        "https://mariadb.atlassian.net/browse/MDEV-3915"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
      "weakness": "CWE-522"
    },
    "CVE-2013-0367": {
      "id": "CVE-2013-0367",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0368": {
      "id": "CVE-2013-0368",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0371": {
      "id": "CVE-2013-0371",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0383": {
      "id": "CVE-2013-0383",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0384": {
      "id": "CVE-2013-0384",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0385": {
      "id": "CVE-2013-0385",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267"
      ],
      "score": 6.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0386": {
      "id": "CVE-2013-0386",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0389": {
      "id": "CVE-2013-0389",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1502": {
      "id": "CVE-2013-1502",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 1.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:L/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1506": {
      "id": "CVE-2013-1506",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1511": {
      "id": "CVE-2013-1511",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1512": {
      "id": "CVE-2013-1512",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1521": {
      "id": "CVE-2013-1521",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1523": {
      "id": "CVE-2013-1523",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1526": {
      "id": "CVE-2013-1526",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1531": {
      "id": "CVE-2013-1531",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1532": {
      "id": "CVE-2013-1532",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1544": {
      "id": "CVE-2013-1544",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1548": {
      "id": "CVE-2013-1548",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.63 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Types.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1552": {
      "id": "CVE-2013-1552",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1555": {
      "id": "CVE-2013-1555",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1861": {
      "id": "CVE-2013-1861",
      "references": [
        "http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://seclists.org/oss-sec/2013/q1/671",
        "http://secunia.com/advisories/52639",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.osvdb.org/91415",
        "http://www.securityfocus.com/bid/58511",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=919247",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
        "https://mariadb.atlassian.net/browse/MDEV-4252",
        "http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://seclists.org/oss-sec/2013/q1/671",
        "http://secunia.com/advisories/52639",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.osvdb.org/91415",
        "http://www.securityfocus.com/bid/58511",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=919247",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
        "https://mariadb.atlassian.net/browse/MDEV-4252"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2013-2375": {
      "id": "CVE-2013-2375",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2376": {
      "id": "CVE-2013-2376",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2378": {
      "id": "CVE-2013-2378",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2389": {
      "id": "CVE-2013-2389",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2391": {
      "id": "CVE-2013-2391",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.",
      "vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2392": {
      "id": "CVE-2013-2392",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3783": {
      "id": "CVE-2013-3783",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95332",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61210",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85719",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95332",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61210",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85719"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3793": {
      "id": "CVE-2013-3793",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95323",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61264",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85710",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95323",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61264",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85710"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3794": {
      "id": "CVE-2013-3794",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95333",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61222",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95333",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61222"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3801": {
      "id": "CVE-2013-3801",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95331",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61269",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95331",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61269"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3802": {
      "id": "CVE-2013-3802",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95325",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61244",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85712",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95325",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61244",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85712"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3804": {
      "id": "CVE-2013-3804",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95328",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85715",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95328",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85715"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3805": {
      "id": "CVE-2013-3805",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95327",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95327",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3808": {
      "id": "CVE-2013-3808",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95330",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85717",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95330",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85717"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3809": {
      "id": "CVE-2013-3809",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95322",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85709",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95322",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85709"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3812": {
      "id": "CVE-2013-3812",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95336",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85723",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95336",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85723"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3839": {
      "id": "CVE-2013-3839",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/55291",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63109",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/55291",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63109",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-4352": {
      "id": "CVE-2013-4352",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c?r1=1491564&r2=1523235&diff_format=h",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120604",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
      ],
      "score": 4.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The cache_invalidate function in modules/cache/cache_storage.c in the mod_cache module in the Apache HTTP Server 2.4.6, when a caching forward proxy is enabled, allows remote HTTP servers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger a missing hostname value.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2013-5704": {
      "id": "CVE-2013-5704",
      "references": [
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://martin.swende.se/blog/HTTPChunked.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0325.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1249.html",
        "http://rhn.redhat.com/errata/RHSA-2015-2661.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0061.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0062.html",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:174",
        "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
        "http://www.securityfocus.com/bid/66550",
        "http://www.ubuntu.com/usn/USN-2523-1",
        "https://access.redhat.com/errata/RHSA-2015:2659",
        "https://access.redhat.com/errata/RHSA-2015:2660",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201504-03",
        "https://support.apple.com/HT204659",
        "https://support.apple.com/HT205219",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://martin.swende.se/blog/HTTPChunked.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0325.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1249.html",
        "http://rhn.redhat.com/errata/RHSA-2015-2661.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0061.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0062.html",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=h",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:174",
        "http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
        "http://www.securityfocus.com/bid/66550",
        "http://www.ubuntu.com/usn/USN-2523-1",
        "https://access.redhat.com/errata/RHSA-2015:2659",
        "https://access.redhat.com/errata/RHSA-2015:2660",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201504-03",
        "https://support.apple.com/HT204659",
        "https://support.apple.com/HT205219"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass \"RequestHeader unset\" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states \"this is not a security issue in httpd as such.\"",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-5807": {
      "id": "CVE-2013-5807",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63105",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63105",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.x through 5.5.32 and 5.6.x through 5.6.12 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-5891": {
      "id": "CVE-2013-5891",
      "references": [
        "http://osvdb.org/102070",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64891",
        "http://osvdb.org/102070",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64891"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-5908": {
      "id": "CVE-2013-5908",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://osvdb.org/102078",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64896",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90389",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://osvdb.org/102078",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64896",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90389"
      ],
      "score": 2.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.",
      "vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-6438": {
      "id": "CVE-2013-6438",
      "references": [
        "http://advisories.mageia.org/MGASA-2014-0135.html",
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://marc.info/?l=bugtraq&m=141017844705317&w=2",
        "http://marc.info/?l=bugtraq&m=141390017113542&w=2",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/58230",
        "http://secunia.com/advisories/59315",
        "http://secunia.com/advisories/59345",
        "http://secunia.com/advisories/60536",
        "http://security.gentoo.org/glsa/glsa-201408-12.xml",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c?r1=1528718&r2=1556428&diff_format=h",
        "http://www-01.ibm.com/support/docview.wss?uid=swg21669554",
        "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
        "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
        "http://www.apache.org/dist/httpd/CHANGES_2.4.9",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/66303",
        "http://www.ubuntu.com/usn/USN-2152-1",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/cve-2013-6438",
        "https://support.apple.com/HT204659",
        "https://support.apple.com/kb/HT6535"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0001": {
      "id": "CVE-2014-0001",
      "references": [
        "http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
        "http://osvdb.org/102713",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/52161",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
        "http://www.osvdb.org/102714",
        "http://www.securityfocus.com/bid/65298",
        "http://www.securitytracker.com/id/1029708",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
        "https://mariadb.com/kb/en/mariadb-5535-changelog/",
        "http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
        "http://osvdb.org/102713",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/52161",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
        "http://www.osvdb.org/102714",
        "http://www.securityfocus.com/bid/65298",
        "http://www.securitytracker.com/id/1029708",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
        "https://mariadb.com/kb/en/mariadb-5535-changelog/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2014-0098": {
      "id": "CVE-2014-0098",
      "references": [
        "http://advisories.mageia.org/MGASA-2014-0135.html",
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://marc.info/?l=bugtraq&m=141017844705317&w=2",
        "http://marc.info/?l=bugtraq&m=141390017113542&w=2",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/58230",
        "http://secunia.com/advisories/58915",
        "http://secunia.com/advisories/59219",
        "http://secunia.com/advisories/59315",
        "http://secunia.com/advisories/59345",
        "http://secunia.com/advisories/60536",
        "http://security.gentoo.org/glsa/glsa-201408-12.xml",
        "http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15320.html",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod_log_config.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod_log_config.c?r1=1575394&r2=1575400&diff_format=h",
        "http://www-01.ibm.com/support/docview.wss?uid=swg21668973",
        "http://www-01.ibm.com/support/docview.wss?uid=swg21676091",
        "http://www-01.ibm.com/support/docview.wss?uid=swg21676092",
        "http://www.apache.org/dist/httpd/CHANGES_2.4.9",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/66303",
        "http://www.ubuntu.com/usn/USN-2152-1",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/cve-2014-0098",
        "https://support.apple.com/HT204659",
        "https://support.apple.com/kb/HT6535"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0117": {
      "id": "CVE-2014-0117",
      "references": [
        "http://advisories.mageia.org/MGASA-2014-0305.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://seclists.org/fulldisclosure/2014/Jul/117",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486&r2=1610674&diff_format=h",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680&r2=1610674&diff_format=h",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://zerodayinitiative.com/advisories/ZDI-14-239/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120599",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT204659",
        "http://advisories.mageia.org/MGASA-2014-0305.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://seclists.org/fulldisclosure/2014/Jul/117",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486&r2=1610674&diff_format=h",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680&r2=1610674&diff_format=h",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://zerodayinitiative.com/advisories/ZDI-14-239/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120599",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT204659"
      ],
      "score": 4.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2014-0118": {
      "id": "CVE-2014-0118",
      "references": [
        "http://advisories.mageia.org/MGASA-2014-0304.html",
        "http://advisories.mageia.org/MGASA-2014-0305.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
        "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://rhn.redhat.com/errata/RHSA-2014-1019.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1020.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1021.html",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/filters/mod_deflate.c?r1=1604353&r2=1610501&diff_format=h",
        "http://www.debian.org/security/2014/dsa-2989",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/68745",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120601",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/cve-2014-0118",
        "https://security.gentoo.org/glsa/201504-03",
        "https://support.apple.com/HT204659"
      ],
      "score": 4.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-400"
    },
    "CVE-2014-0226": {
      "id": "CVE-2014-0226",
      "references": [
        "http://advisories.mageia.org/MGASA-2014-0304.html",
        "http://advisories.mageia.org/MGASA-2014-0305.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
        "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://rhn.redhat.com/errata/RHSA-2014-1019.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1020.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1021.html",
        "http://seclists.org/fulldisclosure/2014/Jul/114",
        "http://secunia.com/advisories/60536",
        "http://security.gentoo.org/glsa/glsa-201408-12.xml",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1450998&r2=1610491&diff_format=h",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c?r1=1588989&r2=1610491&diff_format=h",
        "http://www.debian.org/security/2014/dsa-2989",
        "http://www.exploit-db.com/exploits/34133",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.osvdb.org/109216",
        "http://www.securityfocus.com/bid/68678",
        "http://zerodayinitiative.com/advisories/ZDI-14-236/",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120603",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/cve-2014-0226",
        "https://security.gentoo.org/glsa/201504-03",
        "https://support.apple.com/HT204659",
        "https://www.povonsec.com/apache-2-4-7-exploit/"
      ],
      "score": 6.8,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-362"
    },
    "CVE-2014-0231": {
      "id": "CVE-2014-0231",
      "references": [
        "http://advisories.mageia.org/MGASA-2014-0304.html",
        "http://advisories.mageia.org/MGASA-2014-0305.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
        "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1019.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1020.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1021.html",
        "http://secunia.com/advisories/60536",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h",
        "http://www.debian.org/security/2014/dsa-2989",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/68742",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120596",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/cve-2014-0231",
        "https://security.gentoo.org/glsa/201504-03",
        "https://support.apple.com/HT204659",
        "http://advisories.mageia.org/MGASA-2014-0304.html",
        "http://advisories.mageia.org/MGASA-2014-0305.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=143403519711434&w=2",
        "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
        "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1019.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1020.html",
        "http://rhn.redhat.com/errata/RHSA-2014-1021.html",
        "http://secunia.com/advisories/60536",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h",
        "http://www.debian.org/security/2014/dsa-2989",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:142",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/68742",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1120596",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/cve-2014-0231",
        "https://security.gentoo.org/glsa/201504-03",
        "https://support.apple.com/HT204659"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2014-0384": {
      "id": "CVE-2014-0384",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0386": {
      "id": "CVE-2014-0386",
      "references": [
        "http://osvdb.org/102069",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64904",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90380",
        "http://osvdb.org/102069",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64904",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90380"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0393": {
      "id": "CVE-2014-0393",
      "references": [
        "http://osvdb.org/102075",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64877",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90386",
        "http://osvdb.org/102075",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64877",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90386"
      ],
      "score": 3.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0401": {
      "id": "CVE-2014-0401",
      "references": [
        "http://osvdb.org/102071",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64898",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90382",
        "http://osvdb.org/102071",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64898",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90382"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0402": {
      "id": "CVE-2014-0402",
      "references": [
        "http://osvdb.org/102068",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64908",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90379",
        "http://osvdb.org/102068",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64908",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90379"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0412": {
      "id": "CVE-2014-0412",
      "references": [
        "http://osvdb.org/102067",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64880",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90378",
        "http://osvdb.org/102067",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64880",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90378"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0420": {
      "id": "CVE-2014-0420",
      "references": [
        "http://osvdb.org/102077",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64888",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90388",
        "http://osvdb.org/102077",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64888",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90388"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0437": {
      "id": "CVE-2014-0437",
      "references": [
        "http://osvdb.org/102074",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64849",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90385",
        "http://osvdb.org/102074",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64849",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90385"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2419": {
      "id": "CVE-2014-2419",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66880",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66880"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2430": {
      "id": "CVE-2014-2430",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66858",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66858"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2431": {
      "id": "CVE-2014-2431",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66890",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66890"
      ],
      "score": 2.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.",
      "vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2432": {
      "id": "CVE-2014-2432",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66875",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66875"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2436": {
      "id": "CVE-2014-2436",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66896",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66896"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2438": {
      "id": "CVE-2014-2438",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66846",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66846"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2440": {
      "id": "CVE-2014-2440",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66850",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66850"
      ],
      "score": 5.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
      "vector_string": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2494": {
      "id": "CVE-2014-2494",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-3523": {
      "id": "CVE-2014-3523",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://marc.info/?l=bugtraq&m=143748090628601&w=2",
        "http://marc.info/?l=bugtraq&m=144050155601375&w=2",
        "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/server/mpm/winnt/child.c",
        "http://svn.apache.org/viewvc/httpd/httpd/trunk/server/mpm/winnt/child.c?r1=1608785&r2=1610652&diff_format=h",
        "http://www.securityfocus.com/bid/68747",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-399"
    },
    "CVE-2014-3581": {
      "id": "CVE-2014-3581",
      "references": [
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0325.html",
        "http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/CHANGES?view=markup&pathrev=1627749",
        "http://svn.apache.org/viewvc?view=revision&revision=1624234",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
        "http://www.securityfocus.com/bid/71656",
        "http://www.securitytracker.com/id/1031005",
        "http://www.ubuntu.com/usn/USN-2523-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1149709",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/97027",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201610-02",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-476"
    },
    "CVE-2014-4207": {
      "id": "CVE-2014-4207",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68593",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94624",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68593",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94624"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4243": {
      "id": "CVE-2014-4243",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68611",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94628",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68611",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94628"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4258": {
      "id": "CVE-2014-4258",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68564",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94620",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68564",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94620"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4260": {
      "id": "CVE-2014-4260",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68573",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94621",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68573",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94621"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4274": {
      "id": "CVE-2014-4274",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/69732",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/69732"
      ],
      "score": 4.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.",
      "vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4287": {
      "id": "CVE-2014-4287",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70517",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70517"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6463": {
      "id": "CVE-2014-6463",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70532",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70532"
      ],
      "score": 3.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.",
      "vector_string": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6464": {
      "id": "CVE-2014-6464",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70451",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70451"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6469": {
      "id": "CVE-2014-6469",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70446",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70446"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6478": {
      "id": "CVE-2014-6478",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70489",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70489"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6484": {
      "id": "CVE-2014-6484",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70455",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70455"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6491": {
      "id": "CVE-2014-6491",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70444",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70444"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6494": {
      "id": "CVE-2014-6494",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70497",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70497"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6495": {
      "id": "CVE-2014-6495",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70496",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70496"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6496": {
      "id": "CVE-2014-6496",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70469",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70469"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6500": {
      "id": "CVE-2014-6500",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70478",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70478"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6505": {
      "id": "CVE-2014-6505",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70516",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70516"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6507": {
      "id": "CVE-2014-6507",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70550",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70550"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6520": {
      "id": "CVE-2014-6520",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70510",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70510"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6530": {
      "id": "CVE-2014-6530",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70486",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70486"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6551": {
      "id": "CVE-2014-6551",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70462",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70462"
      ],
      "score": 2.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6555": {
      "id": "CVE-2014-6555",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70530",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70530"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6559": {
      "id": "CVE-2014-6559",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70487",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70487"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6568": {
      "id": "CVE-2014-6568",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72210",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72210",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-8109": {
      "id": "CVE-2014-8109",
      "references": [
        "http://advisories.mageia.org/MGASA-2015-0011.html",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159352.html",
        "http://www.openwall.com/lists/oss-security/2014/11/28/5",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securityfocus.com/bid/73040",
        "http://www.ubuntu.com/usn/USN-2523-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1174077",
        "https://github.com/apache/httpd/commit/3f1693d558d0758f829c8b53993f1749ddf6ffcb",
        "https://issues.apache.org/bugzilla/show_bug.cgi?id=57204",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031"
      ],
      "score": 4.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-863"
    },
    "CVE-2015-0228": {
      "id": "CVE-2015-0228",
      "references": [
        "http://advisories.mageia.org/MGASA-2015-0099.html",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/CHANGES",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
        "http://www.securityfocus.com/bid/73041",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securitytracker.com/id/1032967",
        "http://www.ubuntu.com/usn/USN-2523-1",
        "https://github.com/apache/httpd/commit/643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef",
        "https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031",
        "http://advisories.mageia.org/MGASA-2015-0099.html",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2015-03/msg00006.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
        "http://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x/CHANGES",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html",
        "http://www.securityfocus.com/bid/73041",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securitytracker.com/id/1032967",
        "http://www.ubuntu.com/usn/USN-2523-1",
        "https://github.com/apache/httpd/commit/643f0fcf3b8ab09a68f0ecd2aa37aafeda3e63ef",
        "https://github.com/apache/httpd/commit/78eb3b9235515652ed141353d98c239237030410",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2015-0374": {
      "id": "CVE-2015-0374",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72227",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72227",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0381": {
      "id": "CVE-2015-0381",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72214",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72214",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0382": {
      "id": "CVE-2015-0382",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72200",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72200",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0391": {
      "id": "CVE-2015-0391",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72205",
        "http://www.securitytracker.com/id/1031581",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72205",
        "http://www.securitytracker.com/id/1031581",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0411": {
      "id": "CVE-2015-0411",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72191",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72191",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0432": {
      "id": "CVE-2015-0432",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72217",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72217",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0433": {
      "id": "CVE-2015-0433",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0441": {
      "id": "CVE-2015-0441",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0499": {
      "id": "CVE-2015-0499",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0501": {
      "id": "CVE-2015-0501",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 5.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0505": {
      "id": "CVE-2015-0505",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74112",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74112",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2325": {
      "id": "CVE-2015-2325",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
        "https://bugs.exim.org/show_bug.cgi?id=1591",
        "https://fortiguard.com/zeroday/FG-VD-15-015",
        "https://www.pcre.org/original/changelog.txt",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
        "https://bugs.exim.org/show_bug.cgi?id=1591",
        "https://fortiguard.com/zeroday/FG-VD-15-015",
        "https://www.pcre.org/original/changelog.txt"
      ],
      "score": 7.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2015-2568": {
      "id": "CVE-2015-2568",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74073",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74073",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2571": {
      "id": "CVE-2015-2571",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74095",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74095",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2573": {
      "id": "CVE-2015-2573",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74078",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74078",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2582": {
      "id": "CVE-2015-2582",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75751",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75751",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2620": {
      "id": "CVE-2015-2620",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75837",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75837",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2643": {
      "id": "CVE-2015-2643",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75830",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75830",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2648": {
      "id": "CVE-2015-2648",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75822",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75822",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-3152": {
      "id": "CVE-2015-3152",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
        "http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
        "http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
        "http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.ocert.org/advisories/ocert-2015-003.html",
        "http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
        "http://www.securityfocus.com/bid/74398",
        "http://www.securitytracker.com/id/1032216",
        "https://access.redhat.com/security/cve/cve-2015-3152",
        "https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
        "https://jira.mariadb.org/browse/MDEV-7937",
        "https://www.duosecurity.com/blog/backronym-mysql-vulnerability",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
        "http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
        "http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
        "http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.ocert.org/advisories/ocert-2015-003.html",
        "http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
        "http://www.securityfocus.com/bid/74398",
        "http://www.securitytracker.com/id/1032216",
        "https://access.redhat.com/security/cve/cve-2015-3152",
        "https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
        "https://jira.mariadb.org/browse/MDEV-7937",
        "https://www.duosecurity.com/blog/backronym-mysql-vulnerability"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a \"BACKRONYM\" attack.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-295"
    },
    "CVE-2015-3183": {
      "id": "CVE-2015-3183",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1667.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1668.html",
        "http://rhn.redhat.com/errata/RHSA-2015-2661.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0061.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0062.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2054.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2055.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2056.html",
        "http://www.apache.org/dist/httpd/CHANGES_2.4",
        "http://www.debian.org/security/2015/dsa-3325",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/75963",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securitytracker.com/id/1032967",
        "http://www.ubuntu.com/usn/USN-2686-1",
        "https://access.redhat.com/errata/RHSA-2015:2659",
        "https://access.redhat.com/errata/RHSA-2015:2660",
        "https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6",
        "https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/CVE-2015-3183",
        "https://security.gentoo.org/glsa/201610-02",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10735",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://marc.info/?l=bugtraq&m=144493176821532&w=2",
        "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1667.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1668.html",
        "http://rhn.redhat.com/errata/RHSA-2015-2661.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0061.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0062.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2054.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2055.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2056.html",
        "http://www.apache.org/dist/httpd/CHANGES_2.4",
        "http://www.debian.org/security/2015/dsa-3325",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/75963",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securitytracker.com/id/1032967",
        "http://www.ubuntu.com/usn/USN-2686-1",
        "https://access.redhat.com/errata/RHSA-2015:2659",
        "https://access.redhat.com/errata/RHSA-2015:2660",
        "https://github.com/apache/httpd/commit/a6027e56924bb6227c1fdbf6f91e7e2438338be6",
        "https://github.com/apache/httpd/commit/e427c41257957b57036d5a549b260b6185d1dd73",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246",
        "https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04926789",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://puppet.com/security/cve/CVE-2015-3183",
        "https://security.gentoo.org/glsa/201610-02",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031"
      ],
      "score": 5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-17"
    },
    "CVE-2015-3185": {
      "id": "CVE-2015-3185",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1667.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
        "http://www.apache.org/dist/httpd/CHANGES_2.4",
        "http://www.debian.org/security/2015/dsa-3325",
        "http://www.securityfocus.com/bid/75965",
        "http://www.securitytracker.com/id/1032967",
        "http://www.ubuntu.com/usn/USN-2686-1",
        "https://access.redhat.com/errata/RHSA-2017:2708",
        "https://access.redhat.com/errata/RHSA-2017:2709",
        "https://access.redhat.com/errata/RHSA-2017:2710",
        "https://github.com/apache/httpd/commit/cd2b7a26c776b0754fb98426a67804fd48118708",
        "https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT205217",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2015-10/msg00011.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1666.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1667.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
        "http://www.apache.org/dist/httpd/CHANGES_2.4",
        "http://www.debian.org/security/2015/dsa-3325",
        "http://www.securityfocus.com/bid/75965",
        "http://www.securitytracker.com/id/1032967",
        "http://www.ubuntu.com/usn/USN-2686-1",
        "https://access.redhat.com/errata/RHSA-2017:2708",
        "https://access.redhat.com/errata/RHSA-2017:2709",
        "https://access.redhat.com/errata/RHSA-2017:2710",
        "https://github.com/apache/httpd/commit/cd2b7a26c776b0754fb98426a67804fd48118708",
        "https://github.com/apache/httpd/commit/db81019ab88734ed35fa70294a0cfa7a19743f73",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://support.apple.com/HT205217",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031"
      ],
      "score": 4.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
      "weakness": "CWE-264"
    },
    "CVE-2015-4752": {
      "id": "CVE-2015-4752",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75849",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75849",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4757": {
      "id": "CVE-2015-4757",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75759",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75759",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4792": {
      "id": "CVE-2015-4792",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77171",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77171",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 1.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.",
      "vector_string": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4802": {
      "id": "CVE-2015-4802",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77165",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77165",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4807": {
      "id": "CVE-2015-4807",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77205",
        "http://www.securitytracker.com/id/1033894",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77205",
        "http://www.securitytracker.com/id/1033894",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4815": {
      "id": "CVE-2015-4815",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77222",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77222",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4816": {
      "id": "CVE-2015-4816",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77134",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77134",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4819": {
      "id": "CVE-2015-4819",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77196",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77196",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 7.2,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4826": {
      "id": "CVE-2015-4826",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77237",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77237",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4830": {
      "id": "CVE-2015-4830",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77228",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77228",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4836": {
      "id": "CVE-2015-4836",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77190",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77190",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4858": {
      "id": "CVE-2015-4858",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77145",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77145",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4861": {
      "id": "CVE-2015-4861",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77137",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77137",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4864": {
      "id": "CVE-2015-4864",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77187",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77187",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4870": {
      "id": "CVE-2015-4870",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77208",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.exploit-db.com/exploits/39867/",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77208",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.exploit-db.com/exploits/39867/",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4879": {
      "id": "CVE-2015-4879",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77140",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77140",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4913": {
      "id": "CVE-2015-4913",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77153",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77153",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-7744": {
      "id": "CVE-2015-7744",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708",
        "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
        "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708",
        "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
        "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0502": {
      "id": "CVE-2016-0502",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0610": {
      "id": "CVE-2016-0610",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securityfocus.com/bid/81198",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securityfocus.com/bid/81198",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0616": {
      "id": "CVE-2016-0616",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3453",
        "http://www.debian.org/security/2016/dsa-3459",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/81176",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
        "https://mariadb.com/kb/en/mdb-10023-rn/",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3453",
        "http://www.debian.org/security/2016/dsa-3459",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/81176",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
        "https://mariadb.com/kb/en/mdb-10023-rn/"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0642": {
      "id": "CVE-2016-0642",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3557",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securityfocus.com/bid/86445",
        "http://www.securitytracker.com/id/1035606",
        "http://www.ubuntu.com/usn/USN-2953-1",
        "http://www.ubuntu.com/usn/USN-2954-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3557",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securityfocus.com/bid/86445",
        "http://www.securitytracker.com/id/1035606",
        "http://www.ubuntu.com/usn/USN-2953-1",
        "http://www.ubuntu.com/usn/USN-2954-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 4.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0651": {
      "id": "CVE-2016-0651",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securitytracker.com/id/1035606",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securitytracker.com/id/1035606",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0736": {
      "id": "CVE-2016-0736",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2017-1415.html",
        "http://www.debian.org/security/2017/dsa-3796",
        "http://www.securityfocus.com/bid/95078",
        "http://www.securitytracker.com/id/1037508",
        "https://access.redhat.com/errata/RHSA-2017:0906",
        "https://access.redhat.com/errata/RHSA-2017:1161",
        "https://access.redhat.com/errata/RHSA-2017:1413",
        "https://access.redhat.com/errata/RHSA-2017:1414",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-36",
        "https://security.netapp.com/advisory/ntap-20180423-0001/",
        "https://support.apple.com/HT208221",
        "https://www.exploit-db.com/exploits/40961/",
        "https://www.tenable.com/security/tns-2017-04",
        "http://rhn.redhat.com/errata/RHSA-2017-1415.html",
        "http://www.debian.org/security/2017/dsa-3796",
        "http://www.securityfocus.com/bid/95078",
        "http://www.securitytracker.com/id/1037508",
        "https://access.redhat.com/errata/RHSA-2017:0906",
        "https://access.redhat.com/errata/RHSA-2017:1161",
        "https://access.redhat.com/errata/RHSA-2017:1413",
        "https://access.redhat.com/errata/RHSA-2017:1414",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-0736",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-36",
        "https://security.netapp.com/advisory/ntap-20180423-0001/",
        "https://support.apple.com/HT208221",
        "https://www.exploit-db.com/exploits/40961/",
        "https://www.tenable.com/security/tns-2017-04"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-310"
    },
    "CVE-2016-20012": {
      "id": "CVE-2016-20012",
      "references": [
        "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
        "https://github.com/openssh/openssh-portable/pull/270",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
        "https://rushter.com/blog/public-ssh-keys/",
        "https://security.netapp.com/advisory/ntap-20211014-0005/",
        "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
        "https://www.openwall.com/lists/oss-security/2018/08/24/1",
        "https://github.com/openssh/openssh-portable/blob/d0fffc88c8fe90c1815c6f4097bc8cbcabc0f3dd/auth2-pubkey.c#L261-L265",
        "https://github.com/openssh/openssh-portable/pull/270",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-920577097",
        "https://github.com/openssh/openssh-portable/pull/270#issuecomment-943909185",
        "https://rushter.com/blog/public-ssh-keys/",
        "https://security.netapp.com/advisory/ntap-20211014-0005/",
        "https://utcc.utoronto.ca/~cks/space/blog/tech/SSHKeysAreInfoLeak",
        "https://www.openwall.com/lists/oss-security/2018/08/24/1"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH through 8.7 allows remote attackers, who have a suspicion that a certain combination of username and public key is known to an SSH server, to test whether this suspicion is correct. This occurs because a challenge is sent only when that combination could be valid for a login session. NOTE: the vendor does not recognize user enumeration as a vulnerability for this product",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2016-2161": {
      "id": "CVE-2016-2161",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2017-1415.html",
        "http://www.debian.org/security/2017/dsa-3796",
        "http://www.securityfocus.com/bid/95076",
        "http://www.securitytracker.com/id/1037508",
        "https://access.redhat.com/errata/RHSA-2017:0906",
        "https://access.redhat.com/errata/RHSA-2017:1161",
        "https://access.redhat.com/errata/RHSA-2017:1413",
        "https://access.redhat.com/errata/RHSA-2017:1414",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-36",
        "https://security.netapp.com/advisory/ntap-20180423-0001/",
        "https://support.apple.com/HT208221",
        "https://www.tenable.com/security/tns-2017-04",
        "http://rhn.redhat.com/errata/RHSA-2017-1415.html",
        "http://www.debian.org/security/2017/dsa-3796",
        "http://www.securityfocus.com/bid/95076",
        "http://www.securitytracker.com/id/1037508",
        "https://access.redhat.com/errata/RHSA-2017:0906",
        "https://access.redhat.com/errata/RHSA-2017:1161",
        "https://access.redhat.com/errata/RHSA-2017:1413",
        "https://access.redhat.com/errata/RHSA-2017:1414",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-2161",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-36",
        "https://security.netapp.com/advisory/ntap-20180423-0001/",
        "https://support.apple.com/HT208221",
        "https://www.tenable.com/security/tns-2017-04"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-823"
    },
    "CVE-2016-3471": {
      "id": "CVE-2016-3471",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securityfocus.com/bid/91913",
        "http://www.securitytracker.com/id/1036362",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securityfocus.com/bid/91913",
        "http://www.securitytracker.com/id/1036362",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-3492": {
      "id": "CVE-2016-3492",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93650",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93650",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-4975": {
      "id": "CVE-2016-4975",
      "references": [
        "http://www.securityfocus.com/bid/105093",
        "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180926-0006/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us"
      ],
      "score": 6.1,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-93"
    },
    "CVE-2016-5387": {
      "id": "CVE-2016-5387",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1624.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1625.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1648.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1649.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1650.html",
        "http://www.debian.org/security/2016/dsa-3623",
        "http://www.kb.cert.org/vuls/id/797896",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
        "http://www.securityfocus.com/bid/91816",
        "http://www.securitytracker.com/id/1036330",
        "http://www.ubuntu.com/usn/USN-3038-1",
        "https://access.redhat.com/errata/RHSA-2016:1420",
        "https://access.redhat.com/errata/RHSA-2016:1421",
        "https://access.redhat.com/errata/RHSA-2016:1422",
        "https://access.redhat.com/errata/RHSA-2016:1635",
        "https://access.redhat.com/errata/RHSA-2016:1636",
        "https://access.redhat.com/errata/RHSA-2016:1851",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
        "https://httpoxy.org/",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/",
        "https://security.gentoo.org/glsa/201701-36",
        "https://support.apple.com/HT208221",
        "https://www.apache.org/security/asf-httpoxy-response.txt",
        "https://www.tenable.com/security/tns-2017-04",
        "http://lists.opensuse.org/opensuse-updates/2016-07/msg00059.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1624.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1625.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1648.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1649.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1650.html",
        "http://www.debian.org/security/2016/dsa-3623",
        "http://www.kb.cert.org/vuls/id/797896",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2016-3090566.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html",
        "http://www.securityfocus.com/bid/91816",
        "http://www.securitytracker.com/id/1036330",
        "http://www.ubuntu.com/usn/USN-3038-1",
        "https://access.redhat.com/errata/RHSA-2016:1420",
        "https://access.redhat.com/errata/RHSA-2016:1421",
        "https://access.redhat.com/errata/RHSA-2016:1422",
        "https://access.redhat.com/errata/RHSA-2016:1635",
        "https://access.redhat.com/errata/RHSA-2016:1636",
        "https://access.redhat.com/errata/RHSA-2016:1851",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05320149",
        "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722",
        "https://httpoxy.org/",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rb14daf9cc4e28d18cdc15d6a6ca74e565672fabf7ad89541071d008b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WCTE7443AYZ4EGELWLVNANA2WJCJIYI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEKZAB7MTWVSMORHTEMCQNFFMIHCYF76/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QPQAPWQA774JPDRV4UIB2SZAX6D3UZCV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGNHXJJSWDXAOEYH5TMXDPQVJMQQJOAZ/",
        "https://security.gentoo.org/glsa/201701-36",
        "https://support.apple.com/HT208221",
        "https://www.apache.org/security/asf-httpoxy-response.txt",
        "https://www.tenable.com/security/tns-2017-04"
      ],
      "score": 8.1,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an \"httpoxy\" issue.  NOTE: the vendor states \"This mitigation has been assigned the identifier CVE-2016-5387\"; in other words, this is not a CVE ID for a vulnerability.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5584": {
      "id": "CVE-2016-5584",
      "references": [
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93735",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93735",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5612": {
      "id": "CVE-2016-5612",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-1601.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93630",
        "http://www.securitytracker.com/id/1037050",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-1601.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93630",
        "http://www.securitytracker.com/id/1037050",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5624": {
      "id": "CVE-2016-5624",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93635",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93635",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5626": {
      "id": "CVE-2016-5626",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93638",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93638",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5629": {
      "id": "CVE-2016-5629",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93668",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93668",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-6664": {
      "id": "CVE-2016-6664",
      "references": [
        "http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
        "http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://seclists.org/fulldisclosure/2016/Nov/4",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/archive/1/539695/100/0/threaded",
        "http://www.securityfocus.com/bid/93612",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-18",
        "https://www.exploit-db.com/exploits/40679/",
        "https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/",
        "http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
        "http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://seclists.org/fulldisclosure/2016/Nov/4",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/archive/1/539695/100/0/threaded",
        "http://www.securityfocus.com/bid/93612",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-18",
        "https://www.exploit-db.com/exploits/40679/",
        "https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/"
      ],
      "score": 7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2016-7440": {
      "id": "CVE-2016-7440",
      "references": [
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93659",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html",
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93659",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-8612": {
      "id": "CVE-2016-8612",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
        "http://www.securityfocus.com/bid/94939",
        "https://access.redhat.com/errata/RHSA-2017:0193",
        "https://access.redhat.com/errata/RHSA-2017:0194",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1387605",
        "https://security.netapp.com/advisory/ntap-20180601-0005/",
        "http://rhn.redhat.com/errata/RHSA-2016-2957.html",
        "http://www.securityfocus.com/bid/94939",
        "https://access.redhat.com/errata/RHSA-2017:0193",
        "https://access.redhat.com/errata/RHSA-2017:0194",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1387605",
        "https://security.netapp.com/advisory/ntap-20180601-0005/"
      ],
      "score": 4.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server mod_cluster before version httpd 2.4.23 is vulnerable to an Improper Input Validation in the protocol parsing logic in the load balancer resulting in a Segmentation Fault in the serving httpd process.",
      "vector_string": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "weakness": "CWE-20"
    },
    "CVE-2016-8743": {
      "id": "CVE-2016-8743",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2017-1415.html",
        "http://www.debian.org/security/2017/dsa-3796",
        "http://www.securityfocus.com/bid/95077",
        "http://www.securitytracker.com/id/1037508",
        "https://access.redhat.com/errata/RHSA-2017:0906",
        "https://access.redhat.com/errata/RHSA-2017:1161",
        "https://access.redhat.com/errata/RHSA-2017:1413",
        "https://access.redhat.com/errata/RHSA-2017:1414",
        "https://access.redhat.com/errata/RHSA-2017:1721",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-36",
        "https://security.netapp.com/advisory/ntap-20180423-0001/",
        "https://support.apple.com/HT208221",
        "https://www.tenable.com/security/tns-2017-04",
        "http://rhn.redhat.com/errata/RHSA-2017-1415.html",
        "http://www.debian.org/security/2017/dsa-3796",
        "http://www.securityfocus.com/bid/95077",
        "http://www.securitytracker.com/id/1037508",
        "https://access.redhat.com/errata/RHSA-2017:0906",
        "https://access.redhat.com/errata/RHSA-2017:1161",
        "https://access.redhat.com/errata/RHSA-2017:1413",
        "https://access.redhat.com/errata/RHSA-2017:1414",
        "https://access.redhat.com/errata/RHSA-2017:1721",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu03753en_us",
        "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-8743",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09b8a39d1262adbab5528eea73df1b1f93e919bf004ed5a843d9cad1%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r4fe84db67fe9dc906c6185e58bbd9913f4356dd555a5c3db490694e5%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r94284b139540e5287ebdd3450682d3e3d187263dd6b75af8fa7d4890%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcb6c7b9e7ca727a7eeeb5f13f89488a03981cfa0e7c3125f18fa239%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201701-36",
        "https://security.netapp.com/advisory/ntap-20180423-0001/",
        "https://support.apple.com/HT208221",
        "https://www.tenable.com/security/tns-2017-04"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-9843": {
      "id": "CVE-2016-9843",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
        "http://www.openwall.com/lists/oss-security/2016/12/05/21",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/95131",
        "http://www.securitytracker.com/id/1039427",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2017:1220",
        "https://access.redhat.com/errata/RHSA-2017:1221",
        "https://access.redhat.com/errata/RHSA-2017:1222",
        "https://access.redhat.com/errata/RHSA-2017:2999",
        "https://access.redhat.com/errata/RHSA-2017:3046",
        "https://access.redhat.com/errata/RHSA-2017:3047",
        "https://access.redhat.com/errata/RHSA-2017:3453",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
        "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
        "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
        "https://security.gentoo.org/glsa/201701-56",
        "https://security.gentoo.org/glsa/202007-54",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://support.apple.com/HT208112",
        "https://support.apple.com/HT208113",
        "https://support.apple.com/HT208115",
        "https://support.apple.com/HT208144",
        "https://usn.ubuntu.com/4246-1/",
        "https://usn.ubuntu.com/4292-1/",
        "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
        "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
        "http://www.openwall.com/lists/oss-security/2016/12/05/21",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/95131",
        "http://www.securitytracker.com/id/1039427",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2017:1220",
        "https://access.redhat.com/errata/RHSA-2017:1221",
        "https://access.redhat.com/errata/RHSA-2017:1222",
        "https://access.redhat.com/errata/RHSA-2017:2999",
        "https://access.redhat.com/errata/RHSA-2017:3046",
        "https://access.redhat.com/errata/RHSA-2017:3047",
        "https://access.redhat.com/errata/RHSA-2017:3453",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
        "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
        "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
        "https://security.gentoo.org/glsa/201701-56",
        "https://security.gentoo.org/glsa/202007-54",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://support.apple.com/HT208112",
        "https://support.apple.com/HT208113",
        "https://support.apple.com/HT208115",
        "https://support.apple.com/HT208144",
        "https://usn.ubuntu.com/4246-1/",
        "https://usn.ubuntu.com/4292-1/",
        "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
        "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 9.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "critical",
      "summary": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-10268": {
      "id": "CVE-2017-10268",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101390",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101390",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-10378": {
      "id": "CVE-2017-10378",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101375",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101375",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-10379": {
      "id": "CVE-2017-10379",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101415",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101415",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-863"
    },
    "CVE-2017-10384": {
      "id": "CVE-2017-10384",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101406",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101406",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-15365": {
      "id": "CVE-2017-15365",
      "references": [
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
        "https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
        "https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
        "https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
        "https://www.debian.org/security/2018/dsa-4341",
        "https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
        "https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
        "https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
        "https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
        "https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
        "https://www.debian.org/security/2018/dsa-4341",
        "https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
        "https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html"
      ],
      "score": 8.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-15710": {
      "id": "CVE-2017-15710",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/8",
        "http://www.securityfocus.com/bid/103512",
        "http://www.securitytracker.com/id/1040569",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://usn.ubuntu.com/3937-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to 2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2017-15715": {
      "id": "CVE-2017-15715",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/6",
        "http://www.securityfocus.com/bid/103525",
        "http://www.securitytracker.com/id/1040570",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.openwall.com/lists/oss-security/2018/03/24/6",
        "http://www.securityfocus.com/bid/103525",
        "http://www.securitytracker.com/id/1040570",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://security.elarlang.eu/cve-2017-15715-apache-http-server-filesmatch-bypass-with-a-trailing-newline-at-the-end-of-the-file-name.html",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 8.1,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2017-15906": {
      "id": "CVE-2017-15906",
      "references": [
        "http://www.securityfocus.com/bid/101552",
        "https://access.redhat.com/errata/RHSA-2018:0980",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html",
        "https://security.gentoo.org/glsa/201801-05",
        "https://security.netapp.com/advisory/ntap-20180423-0004/",
        "https://www.openssh.com/txt/release-7.6",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "http://www.securityfocus.com/bid/101552",
        "https://access.redhat.com/errata/RHSA-2018:0980",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://github.com/openbsd/src/commit/a6981567e8e215acc1ef690c8dbb30f2d9b00a19",
        "https://lists.debian.org/debian-lts-announce/2018/09/msg00010.html",
        "https://security.gentoo.org/glsa/201801-05",
        "https://security.netapp.com/advisory/ntap-20180423-0004/",
        "https://www.openssh.com/txt/release-7.6",
        "https://www.oracle.com/security-alerts/cpujan2020.html"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The process_open function in sftp-server.c in OpenSSH before 7.6 does not properly prevent write operations in readonly mode, which allows attackers to create zero-length files.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-732"
    },
    "CVE-2017-3167": {
      "id": "CVE-2017-3167",
      "references": [
        "http://www.debian.org/security/2017/dsa-3896",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/99135",
        "http://www.securitytracker.com/id/1038711",
        "https://access.redhat.com/errata/RHSA-2017:2478",
        "https://access.redhat.com/errata/RHSA-2017:2479",
        "https://access.redhat.com/errata/RHSA-2017:2483",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3475",
        "https://access.redhat.com/errata/RHSA-2017:3476",
        "https://access.redhat.com/errata/RHSA-2017:3477",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20180601-0002/",
        "https://support.apple.com/HT208221",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
        "https://www.nomachine.com/SU08O00185",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.debian.org/security/2017/dsa-3896",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/99135",
        "http://www.securitytracker.com/id/1038711",
        "https://access.redhat.com/errata/RHSA-2017:2478",
        "https://access.redhat.com/errata/RHSA-2017:2479",
        "https://access.redhat.com/errata/RHSA-2017:2483",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3475",
        "https://access.redhat.com/errata/RHSA-2017:3476",
        "https://access.redhat.com/errata/RHSA-2017:3477",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8409e41a8f7dd9ded37141c38df001be930115428c3d64f70bbdb8b4%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r04e89e873d54116a0635ef2f7061c15acc5ed27ef7500997beb65d6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re1e3a24664d35bcd0a0e793e0b5fc6ca6c107f99a1b2c545c5d4b467%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20180601-0002/",
        "https://support.apple.com/HT208221",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
        "https://www.nomachine.com/SU08O00185",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-287"
    },
    "CVE-2017-3238": {
      "id": "CVE-2017-3238",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95571",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95571",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3243": {
      "id": "CVE-2017-3243",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95538",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95538",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3244": {
      "id": "CVE-2017-3244",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95565",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95565",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3258": {
      "id": "CVE-2017-3258",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95560",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95560",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2017-3265": {
      "id": "CVE-2017-3265",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95520",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95520",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 5.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3291": {
      "id": "CVE-2017-3291",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95501",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95501",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3302": {
      "id": "CVE-2017-3302",
      "references": [
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.openwall.com/lists/oss-security/2017/02/11/11",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/96162",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.openwall.com/lists/oss-security/2017/02/11/11",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/96162",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2017-3308": {
      "id": "CVE-2017-3308",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97725",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97725",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 7.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3309": {
      "id": "CVE-2017-3309",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97742",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97742",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 7.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3312": {
      "id": "CVE-2017-3312",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95491",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95491",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3313": {
      "id": "CVE-2017-3313",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95527",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95527",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17"
      ],
      "score": 4.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3317": {
      "id": "CVE-2017-3317",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95585",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95585",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3318": {
      "id": "CVE-2017-3318",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95588",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95588",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3453": {
      "id": "CVE-2017-3453",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97776",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97776",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3456": {
      "id": "CVE-2017-3456",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97831",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97831",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3464": {
      "id": "CVE-2017-3464",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97818",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97818",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3600": {
      "id": "CVE-2017-3600",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97765",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97765",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886"
      ],
      "score": 6.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3636": {
      "id": "CVE-2017-3636",
      "references": [
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99736",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99736",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3641": {
      "id": "CVE-2017-3641",
      "references": [
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99767",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99767",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3651": {
      "id": "CVE-2017-3651",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99802",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99802",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3653": {
      "id": "CVE-2017-3653",
      "references": [
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99810",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99810",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955"
      ],
      "score": 3.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-7679": {
      "id": "CVE-2017-7679",
      "references": [
        "http://www.debian.org/security/2017/dsa-3896",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/99170",
        "http://www.securitytracker.com/id/1038711",
        "https://access.redhat.com/errata/RHSA-2017:2478",
        "https://access.redhat.com/errata/RHSA-2017:2479",
        "https://access.redhat.com/errata/RHSA-2017:2483",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3475",
        "https://access.redhat.com/errata/RHSA-2017:3476",
        "https://access.redhat.com/errata/RHSA-2017:3477",
        "https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20180601-0002/",
        "https://support.apple.com/HT208221",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
        "https://www.nomachine.com/SU08O00185",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.debian.org/security/2017/dsa-3896",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/99170",
        "http://www.securitytracker.com/id/1038711",
        "https://access.redhat.com/errata/RHSA-2017:2478",
        "https://access.redhat.com/errata/RHSA-2017:2479",
        "https://access.redhat.com/errata/RHSA-2017:2483",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3475",
        "https://access.redhat.com/errata/RHSA-2017:3476",
        "https://access.redhat.com/errata/RHSA-2017:3477",
        "https://github.com/gottburgm/Exploits/tree/master/CVE-2017-7679",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f4515e580dfb6eeca589a5cdebd4c4c709ce632b12924f343c3b7751%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20180601-0002/",
        "https://support.apple.com/HT208221",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03821en_us",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
        "https://www.nomachine.com/SU08O00185",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-126"
    },
    "CVE-2017-9788": {
      "id": "CVE-2017-9788",
      "references": [
        "http://www.debian.org/security/2017/dsa-3913",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/99569",
        "http://www.securitytracker.com/id/1038906",
        "https://access.redhat.com/errata/RHSA-2017:2478",
        "https://access.redhat.com/errata/RHSA-2017:2479",
        "https://access.redhat.com/errata/RHSA-2017:2483",
        "https://access.redhat.com/errata/RHSA-2017:2708",
        "https://access.redhat.com/errata/RHSA-2017:2709",
        "https://access.redhat.com/errata/RHSA-2017:2710",
        "https://access.redhat.com/errata/RHSA-2017:3113",
        "https://access.redhat.com/errata/RHSA-2017:3114",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3239",
        "https://access.redhat.com/errata/RHSA-2017:3240",
        "https://httpd.apache.org/security/vulnerabilities_22.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20170911-0002/",
        "https://support.apple.com/HT208221",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.debian.org/security/2017/dsa-3913",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/99569",
        "http://www.securitytracker.com/id/1038906",
        "https://access.redhat.com/errata/RHSA-2017:2478",
        "https://access.redhat.com/errata/RHSA-2017:2479",
        "https://access.redhat.com/errata/RHSA-2017:2483",
        "https://access.redhat.com/errata/RHSA-2017:2708",
        "https://access.redhat.com/errata/RHSA-2017:2709",
        "https://access.redhat.com/errata/RHSA-2017:2710",
        "https://access.redhat.com/errata/RHSA-2017:3113",
        "https://access.redhat.com/errata/RHSA-2017:3114",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3239",
        "https://access.redhat.com/errata/RHSA-2017:3240",
        "https://httpd.apache.org/security/vulnerabilities_22.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/0dd69204a6bd643cc4e9ccd008f07a9375525d977c6ebeb07a881afb%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20170911-0002/",
        "https://support.apple.com/HT208221",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03908en_us",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 9.1,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2017-9798": {
      "id": "CVE-2017-9798",
      "references": [
        "http://openwall.com/lists/oss-security/2017/09/18/2",
        "http://www.debian.org/security/2017/dsa-3980",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/100872",
        "http://www.securityfocus.com/bid/105598",
        "http://www.securitytracker.com/id/1039387",
        "https://access.redhat.com/errata/RHSA-2017:2882",
        "https://access.redhat.com/errata/RHSA-2017:2972",
        "https://access.redhat.com/errata/RHSA-2017:3018",
        "https://access.redhat.com/errata/RHSA-2017:3113",
        "https://access.redhat.com/errata/RHSA-2017:3114",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3239",
        "https://access.redhat.com/errata/RHSA-2017:3240",
        "https://access.redhat.com/errata/RHSA-2017:3475",
        "https://access.redhat.com/errata/RHSA-2017:3476",
        "https://access.redhat.com/errata/RHSA-2017:3477",
        "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
        "https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
        "https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a",
        "https://github.com/hannob/optionsbleed",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security-tracker.debian.org/tracker/CVE-2017-9798",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20180601-0003/",
        "https://support.apple.com/HT208331",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
        "https://www.exploit-db.com/exploits/42745/",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "https://www.tenable.com/security/tns-2019-09",
        "http://openwall.com/lists/oss-security/2017/09/18/2",
        "http://www.debian.org/security/2017/dsa-3980",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/100872",
        "http://www.securityfocus.com/bid/105598",
        "http://www.securitytracker.com/id/1039387",
        "https://access.redhat.com/errata/RHSA-2017:2882",
        "https://access.redhat.com/errata/RHSA-2017:2972",
        "https://access.redhat.com/errata/RHSA-2017:3018",
        "https://access.redhat.com/errata/RHSA-2017:3113",
        "https://access.redhat.com/errata/RHSA-2017:3114",
        "https://access.redhat.com/errata/RHSA-2017:3193",
        "https://access.redhat.com/errata/RHSA-2017:3194",
        "https://access.redhat.com/errata/RHSA-2017:3195",
        "https://access.redhat.com/errata/RHSA-2017:3239",
        "https://access.redhat.com/errata/RHSA-2017:3240",
        "https://access.redhat.com/errata/RHSA-2017:3475",
        "https://access.redhat.com/errata/RHSA-2017:3476",
        "https://access.redhat.com/errata/RHSA-2017:3477",
        "https://blog.fuzzing-project.org/60-Optionsbleed-HTTP-OPTIONS-method-can-leak-Apaches-server-memory.html",
        "https://blog.fuzzing-project.org/uploads/apache-2.2-optionsbleed-backport.patch",
        "https://github.com/apache/httpd/commit/4cc27823899e070268b906ca677ee838d07cf67a",
        "https://github.com/hannob/optionsbleed",
        "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2017-9798",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security-tracker.debian.org/tracker/CVE-2017-9798",
        "https://security.gentoo.org/glsa/201710-32",
        "https://security.netapp.com/advisory/ntap-20180601-0003/",
        "https://support.apple.com/HT208331",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/server/core.c?r1=1805223&r2=1807754&pathrev=1807754&view=patch",
        "https://www.exploit-db.com/exploits/42745/",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secret data. This is a use-after-free issue and thus secret data is not always sent, and the specific data depends on many factors including configuration. Exploitation with .htaccess can be blocked with a patch to the ap_limit_section function in server/core.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-416"
    },
    "CVE-2018-1283": {
      "id": "CVE-2018-1283",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/4",
        "http://www.securityfocus.com/bid/103520",
        "http://www.securitytracker.com/id/1040568",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.openwall.com/lists/oss-security/2018/03/24/4",
        "http://www.securityfocus.com/bid/103520",
        "http://www.securitytracker.com/id/1040568",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a \"Session\" header. This comes from the \"HTTP_SESSION\" variable name used by mod_session to forward its data to CGIs, since the prefix \"HTTP_\" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-1301": {
      "id": "CVE-2018-1301",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/2",
        "http://www.securityfocus.com/bid/103515",
        "http://www.securitytracker.com/id/1040573",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://usn.ubuntu.com/3937-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.openwall.com/lists/oss-security/2018/03/24/2",
        "http://www.securityfocus.com/bid/103515",
        "http://www.securitytracker.com/id/1040573",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6521a7f62276340eabdb3339b2aa9a38c5f59d978497a1f794af53be%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://usn.ubuntu.com/3937-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 5.9,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.30, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-119"
    },
    "CVE-2018-1302": {
      "id": "CVE-2018-1302",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/5",
        "http://www.securityfocus.com/bid/103528",
        "http://www.securitytracker.com/id/1040567",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3783-1/",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.openwall.com/lists/oss-security/2018/03/24/5",
        "http://www.securityfocus.com/bid/103528",
        "http://www.securitytracker.com/id/1040567",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3783-1/",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 5.9,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerability hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2018-1303": {
      "id": "CVE-2018-1303",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/3",
        "http://www.securityfocus.com/bid/103522",
        "http://www.securitytracker.com/id/1040572",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.openwall.com/lists/oss-security/2018/03/24/3",
        "http://www.securityfocus.com/bid/103522",
        "http://www.securitytracker.com/id/1040572",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2018-1312": {
      "id": "CVE-2018-1312",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/03/24/7",
        "http://www.securityfocus.com/bid/103524",
        "http://www.securitytracker.com/id/1040571",
        "https://access.redhat.com/errata/RHSA-2018:3558",
        "https://access.redhat.com/errata/RHSA-2019:0366",
        "https://access.redhat.com/errata/RHSA-2019:0367",
        "https://access.redhat.com/errata/RHSA-2019:1898",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r15f9aa4427581a1aecb4063f1b4b983511ae1c9935e2a0a6876dad3c%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rfcf929bd33a6833e3f0c35eebdad70d5060665f9c4e17ea467c66770%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2018/05/msg00020.html",
        "https://security.netapp.com/advisory/ntap-20180601-0004/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03909en_us",
        "https://usn.ubuntu.com/3627-1/",
        "https://usn.ubuntu.com/3627-2/",
        "https://usn.ubuntu.com/3937-2/",
        "https://www.debian.org/security/2018/dsa-4164",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-287"
    },
    "CVE-2018-15473": {
      "id": "CVE-2018-15473",
      "references": [
        "http://www.openwall.com/lists/oss-security/2018/08/15/5",
        "http://www.securityfocus.com/bid/105140",
        "http://www.securitytracker.com/id/1041487",
        "https://access.redhat.com/errata/RHSA-2019:0711",
        "https://access.redhat.com/errata/RHSA-2019:2143",
        "https://bugs.debian.org/906236",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
        "https://security.gentoo.org/glsa/201810-03",
        "https://security.netapp.com/advisory/ntap-20181101-0001/",
        "https://usn.ubuntu.com/3809-1/",
        "https://www.debian.org/security/2018/dsa-4280",
        "https://www.exploit-db.com/exploits/45210/",
        "https://www.exploit-db.com/exploits/45233/",
        "https://www.exploit-db.com/exploits/45939/",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "http://www.openwall.com/lists/oss-security/2018/08/15/5",
        "http://www.securityfocus.com/bid/105140",
        "http://www.securitytracker.com/id/1041487",
        "https://access.redhat.com/errata/RHSA-2019:0711",
        "https://access.redhat.com/errata/RHSA-2019:2143",
        "https://bugs.debian.org/906236",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://github.com/openbsd/src/commit/779974d35b4859c07bc3cb8a12c74b43b0a7d1e0",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00022.html",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0011",
        "https://security.gentoo.org/glsa/201810-03",
        "https://security.netapp.com/advisory/ntap-20181101-0001/",
        "https://usn.ubuntu.com/3809-1/",
        "https://www.debian.org/security/2018/dsa-4280",
        "https://www.exploit-db.com/exploits/45210/",
        "https://www.exploit-db.com/exploits/45233/",
        "https://www.exploit-db.com/exploits/45939/",
        "https://www.oracle.com/security-alerts/cpujan2020.html"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-362"
    },
    "CVE-2018-15919": {
      "id": "CVE-2018-15919",
      "references": [
        "http://seclists.org/oss-sec/2018/q3/180",
        "http://www.securityfocus.com/bid/105163",
        "https://security.netapp.com/advisory/ntap-20181221-0001/",
        "http://seclists.org/oss-sec/2018/q3/180",
        "http://www.securityfocus.com/bid/105163",
        "https://security.netapp.com/advisory/ntap-20181221-0001/"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "Remotely observable behaviour in auth-gss2.c in OpenSSH through 7.8 could be used by remote attackers to detect existence of users on a target system when GSS2 is in use. NOTE: the discoverer states 'We understand that the OpenSSH developers do not want to treat such a username enumeration (or \"oracle\") as a vulnerability.'",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2018-17199": {
      "id": "CVE-2018-17199",
      "references": [
        "http://www.securityfocus.com/bid/106742",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html",
        "https://seclists.org/bugtraq/2019/Apr/5",
        "https://security.gentoo.org/glsa/201903-21",
        "https://security.netapp.com/advisory/ntap-20190125-0001/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
        "https://usn.ubuntu.com/3937-1/",
        "https://www.debian.org/security/2019/dsa-4422",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://www.tenable.com/security/tns-2019-09",
        "http://www.securityfocus.com/bid/106742",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/01/msg00024.html",
        "https://seclists.org/bugtraq/2019/Apr/5",
        "https://security.gentoo.org/glsa/201903-21",
        "https://security.netapp.com/advisory/ntap-20190125-0001/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
        "https://usn.ubuntu.com/3937-1/",
        "https://www.debian.org/security/2019/dsa-4422",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://www.tenable.com/security/tns-2019-09"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-384"
    },
    "CVE-2018-20685": {
      "id": "CVE-2018-20685",
      "references": [
        "http://www.securityfocus.com/bid/106531",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
        "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.gentoo.org/glsa/202007-53",
        "https://security.netapp.com/advisory/ntap-20190215-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://www.securityfocus.com/bid/106531",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/scp.c.diff?r1=1.197&r2=1.198&f=h",
        "https://github.com/openssh/openssh-portable/commit/6010c0303a422a9c5fa8860c061bf7105eb7f8b2",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.gentoo.org/glsa/202007-53",
        "https://security.netapp.com/advisory/ntap-20190215-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 5.3,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In OpenSSH 7.9, scp.c in the scp client allows remote SSH servers to bypass intended access restrictions via the filename of . or an empty filename. The impact is modifying the permissions of the target directory on the client side.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
      "weakness": "CWE-863"
    },
    "CVE-2018-2562": {
      "id": "CVE-2018-2562",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102713",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102713",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 7.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2622": {
      "id": "CVE-2018-2622",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102706",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102706",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2640": {
      "id": "CVE-2018-2640",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102678",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102678",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2665": {
      "id": "CVE-2018-2665",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102681",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102681",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2668": {
      "id": "CVE-2018-2668",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102682",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102682",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2755": {
      "id": "CVE-2018-2755",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103807",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103807",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 7.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2761": {
      "id": "CVE-2018-2761",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103820",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103820",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2767": {
      "id": "CVE-2018-2767",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/103954",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/103954",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 3.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2771": {
      "id": "CVE-2018-2771",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103828",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103828",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2781": {
      "id": "CVE-2018-2781",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103825",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103825",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2813": {
      "id": "CVE-2018-2813",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103830",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103830",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2817": {
      "id": "CVE-2018-2817",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103818",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103818",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2819": {
      "id": "CVE-2018-2819",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103814",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103814",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3058": {
      "id": "CVE-2018-3058",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3063": {
      "id": "CVE-2018-3063",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104786",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104786",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3066": {
      "id": "CVE-2018-3066",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 3.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3081": {
      "id": "CVE-2018-3081",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104779",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104779",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3133": {
      "id": "CVE-2018-3133",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3174": {
      "id": "CVE-2018-3174",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105612",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105612",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3282": {
      "id": "CVE-2018-3282",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-0217": {
      "id": "CVE-2019-0217",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
        "http://www.openwall.com/lists/oss-security/2019/04/02/5",
        "http://www.securityfocus.com/bid/107668",
        "https://access.redhat.com/errata/RHSA-2019:2343",
        "https://access.redhat.com/errata/RHSA-2019:3436",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1695020",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
        "https://seclists.org/bugtraq/2019/Apr/5",
        "https://security.netapp.com/advisory/ntap-20190423-0001/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
        "https://usn.ubuntu.com/3937-1/",
        "https://usn.ubuntu.com/3937-2/",
        "https://www.debian.org/security/2019/dsa-4422",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
        "http://www.openwall.com/lists/oss-security/2019/04/02/5",
        "http://www.securityfocus.com/bid/107668",
        "https://access.redhat.com/errata/RHSA-2019:2343",
        "https://access.redhat.com/errata/RHSA-2019:3436",
        "https://access.redhat.com/errata/RHSA-2019:3932",
        "https://access.redhat.com/errata/RHSA-2019:3933",
        "https://access.redhat.com/errata/RHSA-2019:3935",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1695020",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/e0b8f6e858b1c8ec2ce8e291a2c543d438915037c7af661ab6d33808%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
        "https://seclists.org/bugtraq/2019/Apr/5",
        "https://security.netapp.com/advisory/ntap-20190423-0001/",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
        "https://usn.ubuntu.com/3937-1/",
        "https://usn.ubuntu.com/3937-2/",
        "https://www.debian.org/security/2019/dsa-4422",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-362"
    },
    "CVE-2019-0220": {
      "id": "CVE-2019-0220",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
        "http://www.openwall.com/lists/oss-security/2019/04/02/6",
        "http://www.securityfocus.com/bid/107670",
        "https://access.redhat.com/errata/RHSA-2019:2343",
        "https://access.redhat.com/errata/RHSA-2019:3436",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://access.redhat.com/errata/RHSA-2020:0250",
        "https://access.redhat.com/errata/RHSA-2020:0251",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
        "https://seclists.org/bugtraq/2019/Apr/5",
        "https://security.netapp.com/advisory/ntap-20190625-0007/",
        "https://support.f5.com/csp/article/K44591505",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
        "https://usn.ubuntu.com/3937-1/",
        "https://www.debian.org/security/2019/dsa-4422",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html",
        "http://www.openwall.com/lists/oss-security/2019/04/02/6",
        "http://www.securityfocus.com/bid/107670",
        "https://access.redhat.com/errata/RHSA-2019:2343",
        "https://access.redhat.com/errata/RHSA-2019:3436",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://access.redhat.com/errata/RHSA-2020:0250",
        "https://access.redhat.com/errata/RHSA-2020:0251",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r31f46d1f16ffcafa68058596b21f6eaf6d352290e522690a1cdccdd7%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re473305a65b4db888e3556e4dae10c2a04ee89dcff2e26ecdbd860a9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/04/msg00008.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ALIR5S3O7NRHEGFMIDMUSYQIZOE4TJJN/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZRMTEIGZKYFNGIDOTXN3GNEJTLVCYU7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WETXNQWNQLWHV6XNW6YTO5UGDTIWAQGT/",
        "https://seclists.org/bugtraq/2019/Apr/5",
        "https://security.netapp.com/advisory/ntap-20190625-0007/",
        "https://support.f5.com/csp/article/K44591505",
        "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us",
        "https://usn.ubuntu.com/3937-1/",
        "https://www.debian.org/security/2019/dsa-4422",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-706"
    },
    "CVE-2019-10092": {
      "id": "CVE-2019-10092",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
        "http://www.openwall.com/lists/oss-security/2019/08/15/4",
        "http://www.openwall.com/lists/oss-security/2020/08/08/1",
        "http://www.openwall.com/lists/oss-security/2020/08/08/9",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/",
        "https://seclists.org/bugtraq/2019/Aug/47",
        "https://seclists.org/bugtraq/2019/Oct/24",
        "https://security.gentoo.org/glsa/201909-04",
        "https://security.netapp.com/advisory/ntap-20190905-0003/",
        "https://support.f5.com/csp/article/K30442259",
        "https://usn.ubuntu.com/4113-1/",
        "https://www.debian.org/security/2019/dsa-4509",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html",
        "http://www.openwall.com/lists/oss-security/2019/08/15/4",
        "http://www.openwall.com/lists/oss-security/2020/08/08/1",
        "http://www.openwall.com/lists/oss-security/2020/08/08/9",
        "https://access.redhat.com/errata/RHSA-2019:4126",
        "https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html",
        "https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/",
        "https://seclists.org/bugtraq/2019/Aug/47",
        "https://seclists.org/bugtraq/2019/Oct/24",
        "https://security.gentoo.org/glsa/201909-04",
        "https://security.netapp.com/advisory/ntap-20190905-0003/",
        "https://support.f5.com/csp/article/K30442259",
        "https://usn.ubuntu.com/4113-1/",
        "https://www.debian.org/security/2019/dsa-4509",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 6.1,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malformed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-79"
    },
    "CVE-2019-10098": {
      "id": "CVE-2019-10098",
      "references": [
        "http://www.openwall.com/lists/oss-security/2020/04/01/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://www.openwall.com/lists/oss-security/2020/04/01/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 6.1,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an unexpected URL within the request URL.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-601"
    },
    "CVE-2019-17567": {
      "id": "CVE-2019-17567",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/2",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/2",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2019-2455": {
      "id": "CVE-2019-2455",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106628",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106628",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2481": {
      "id": "CVE-2019-2481",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2503": {
      "id": "CVE-2019-2503",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106626",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106626",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 6.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2529": {
      "id": "CVE-2019-2529",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2614": {
      "id": "CVE-2019-2614",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://support.f5.com/csp/article/K52514501",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://support.f5.com/csp/article/K52514501",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2627": {
      "id": "CVE-2019-2627",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://support.f5.com/csp/article/K32798641",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://support.f5.com/csp/article/K32798641",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2737": {
      "id": "CVE-2019-2737",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2739": {
      "id": "CVE-2019-2739",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 5.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2740": {
      "id": "CVE-2019-2740",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K03444640",
        "https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K03444640",
        "https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2805": {
      "id": "CVE-2019-2805",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K04831884",
        "https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K04831884",
        "https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2974": {
      "id": "CVE-2019-2974",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20191017-0002/",
        "https://usn.ubuntu.com/4195-1/",
        "https://usn.ubuntu.com/4195-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20191017-0002/",
        "https://usn.ubuntu.com/4195-1/",
        "https://usn.ubuntu.com/4195-2/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-6109": {
      "id": "CVE-2019-6109",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 6.8,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
      "weakness": "CWE-116"
    },
    "CVE-2019-6110": {
      "id": "CVE-2019-6110",
      "references": [
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://www.exploit-db.com/exploits/46193/",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/progressmeter.c",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://www.exploit-db.com/exploits/46193/"
      ],
      "score": 6.8,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
      "weakness": "CWE-838"
    },
    "CVE-2019-6111": {
      "id": "CVE-2019-6111",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "http://www.openwall.com/lists/oss-security/2019/04/18/1",
        "http://www.openwall.com/lists/oss-security/2022/08/02/1",
        "http://www.securityfocus.com/bid/106741",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://usn.ubuntu.com/3885-2/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.exploit-db.com/exploits/46193/",
        "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00058.html",
        "http://www.openwall.com/lists/oss-security/2019/04/18/1",
        "http://www.openwall.com/lists/oss-security/2022/08/02/1",
        "http://www.securityfocus.com/bid/106741",
        "https://access.redhat.com/errata/RHSA-2019:3702",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1677794",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf",
        "https://cvsweb.openbsd.org/src/usr.bin/ssh/scp.c",
        "https://lists.apache.org/thread.html/c45d9bc90700354b58fb7455962873c44229841880dcb64842fa7d23%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/c7301cab36a86825359e1b725fc40304d1df56dc6d107c1fe885148b%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a%40%3Cdev.mina.apache.org%3E",
        "https://lists.apache.org/thread.html/e47597433b351d6e01a5d68d610b4ba195743def9730e49561e8cf3f%40%3Cdev.mina.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00030.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3YVQ2BPTOVDCFDVNC2GGF5P5ISFG37G/",
        "https://security.gentoo.org/glsa/201903-16",
        "https://security.netapp.com/advisory/ntap-20190213-0001/",
        "https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt",
        "https://usn.ubuntu.com/3885-1/",
        "https://usn.ubuntu.com/3885-2/",
        "https://www.debian.org/security/2019/dsa-4387",
        "https://www.exploit-db.com/exploits/46193/",
        "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc",
        "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "An issue was discovered in OpenSSH 7.9. Due to the scp implementation being derived from 1983 rcp, the server chooses which files/directories are sent to the client. However, the scp client only performs cursory validation of the object name returned (only directory traversal attacks are prevented). A malicious scp server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the scp client target directory. If recursive operation (-r) is performed, the server can manipulate subdirectories as well (for example, to overwrite the .ssh/authorized_keys file).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-22"
    },
    "CVE-2020-11985": {
      "id": "CVE-2020-11985",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.gentoo.org/glsa/202008-04",
        "https://security.netapp.com/advisory/ntap-20200827-0002/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.gentoo.org/glsa/202008-04",
        "https://security.netapp.com/advisory/ntap-20200827-0002/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "IP address spoofing when proxying using mod_remoteip and mod_rewrite For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-345"
    },
    "CVE-2020-13938": {
      "id": "CVE-2020-13938",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/3",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/3",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r5fdc4fbbc7ddb816c843329a9accdcf284ade86e8d77b8c2a6d9bc30%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://security.netapp.com/advisory/ntap-20210702-0001/"
      ],
      "score": 5.5,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-862"
    },
    "CVE-2020-14145": {
      "id": "CVE-2020-14145",
      "references": [
        "http://www.openwall.com/lists/oss-security/2020/12/02/1",
        "https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
        "https://docs.ssh-mitm.at/CVE-2020-14145.html",
        "https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
        "https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20200709-0004/",
        "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/",
        "http://www.openwall.com/lists/oss-security/2020/12/02/1",
        "https://anongit.mindrot.org/openssh.git/commit/?id=b3855ff053f5078ec3d3c653cdaedefaa5fc362d",
        "https://docs.ssh-mitm.at/CVE-2020-14145.html",
        "https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1",
        "https://github.com/ssh-mitm/ssh-mitm/blob/master/ssh_proxy_server/plugins/session/cve202014145.py",
        "https://security.gentoo.org/glsa/202105-35",
        "https://security.netapp.com/advisory/ntap-20200709-0004/",
        "https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2020-2-ausnutzung-eines-informationslecks-fuer-gezielte-mitm-angriffe-auf-ssh-clients/"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The client side in OpenSSH 5.7 through 8.4 has an Observable Discrepancy leading to an information leak in the algorithm negotiation. This allows man-in-the-middle attackers to target initial connection attempts (where no host key for the server has been cached by the client). NOTE: some reports state that 8.5 and 8.6 are also affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-203"
    },
    "CVE-2020-14550": {
      "id": "CVE-2020-14550",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://usn.ubuntu.com/4441-1/",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://usn.ubuntu.com/4441-1/",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-15778": {
      "id": "CVE-2020-15778",
      "references": [
        "https://access.redhat.com/errata/RHSA-2024:3166",
        "https://github.com/cpandya2909/CVE-2020-15778/",
        "https://news.ycombinator.com/item?id=25005567",
        "https://security.gentoo.org/glsa/202212-06",
        "https://security.netapp.com/advisory/ntap-20200731-0007/",
        "https://www.openssh.com/security.html",
        "https://access.redhat.com/errata/RHSA-2024:3166",
        "https://github.com/cpandya2909/CVE-2020-15778/",
        "https://news.ycombinator.com/item?id=25005567",
        "https://security.gentoo.org/glsa/202212-06",
        "https://security.netapp.com/advisory/ntap-20200731-0007/",
        "https://www.openssh.com/security.html"
      ],
      "score": 7.4,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "scp in OpenSSH through 8.3p1 allows command injection in the scp.c toremote function, as demonstrated by backtick characters in the destination argument. NOTE: the vendor reportedly has stated that they intentionally omit validation of \"anomalous argument transfers\" because that could \"stand a great chance of breaking existing workflows.\"",
      "vector_string": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-78"
    },
    "CVE-2020-1927": {
      "id": "CVE-2020-1927",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "http://www.openwall.com/lists/oss-security/2020/04/03/1",
        "http://www.openwall.com/lists/oss-security/2020/04/04/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "http://www.openwall.com/lists/oss-security/2020/04/03/1",
        "http://www.openwall.com/lists/oss-security/2020/04/04/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpuApr2021.html",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 6.1,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
      "weakness": "CWE-601"
    },
    "CVE-2020-1934": {
      "id": "CVE-2020-1934",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r26706d75f6b9080ca6a29955aeb8de98ec71bbea6e9f05809c46bca4%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r33e626224386d2851a83c352f784ba90dedee5dc7fcfcc221d5d7527%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/",
        "https://security.netapp.com/advisory/ntap-20200413-0002/",
        "https://usn.ubuntu.com/4458-1/",
        "https://www.debian.org/security/2020/dsa-4757",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-908"
    },
    "CVE-2020-2574": {
      "id": "CVE-2020-2574",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
        "http://www.openwall.com/lists/oss-security/2020/09/29/1",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200122-0002/",
        "https://usn.ubuntu.com/4250-1/",
        "https://usn.ubuntu.com/4250-2/",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
        "http://www.openwall.com/lists/oss-security/2020/09/29/1",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200122-0002/",
        "https://usn.ubuntu.com/4250-1/",
        "https://usn.ubuntu.com/4250-2/",
        "https://www.oracle.com/security-alerts/cpujan2020.html"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-2752": {
      "id": "CVE-2020-2752",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-2780": {
      "id": "CVE-2020-2780",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-2812": {
      "id": "CVE-2020-2812",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-28912": {
      "id": "CVE-2020-28912",
      "references": [
        "https://hackerone.com/reports/1019891",
        "https://jira.mariadb.org/browse/MDEV-24040",
        "https://hackerone.com/reports/1019891",
        "https://jira.mariadb.org/browse/MDEV-24040"
      ],
      "score": 7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-2922": {
      "id": "CVE-2020-2922",
      "references": [
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 3.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-35452": {
      "id": "CVE-2020-35452",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/5",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/5",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rccb1b8225583a48c6360edc7a93cc97ae8b0215791e455dc607e7602%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 7.3,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
      "weakness": "CWE-787"
    },
    "CVE-2021-2007": {
      "id": "CVE-2021-2007",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 3.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-2011": {
      "id": "CVE-2021-2011",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-2144": {
      "id": "CVE-2021-2144",
      "references": [
        "https://security.netapp.com/advisory/ntap-20210513-0002/",
        "https://www.oracle.com/security-alerts/cpuapr2021.html",
        "https://security.netapp.com/advisory/ntap-20210513-0002/",
        "https://www.oracle.com/security-alerts/cpuapr2021.html"
      ],
      "score": 7.2,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-26690": {
      "id": "CVE-2021-26690",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/6",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/6",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rae406c1d19c0dfd3103c96923dadac2af1cd0bad6905ab1ede153865%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2021-26691": {
      "id": "CVE-2021-26691",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/7",
        "https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2021/06/10/7",
        "https://lists.apache.org/thread.html/r50cae1b71f1e7421069036b213c26da7d8f47dd59874e3bd956959fe%40%3Cannounce.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r7f2b70b621651548f4b6f027552f1dd91705d7111bb5d15cda0a68dd%40%3Cdev.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/re026d3da9d7824bd93b9f871c0fdda978d960c7e62d8c43cba8d0bf3%40%3Ccvs.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202107-38",
        "https://security.netapp.com/advisory/ntap-20210702-0001/",
        "https://www.debian.org/security/2021/dsa-4937",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.oracle.com/security-alerts/cpuoct2021.html"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-122"
    },
    "CVE-2021-34798": {
      "id": "CVE-2021-34798",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://kc.mcafee.com/corporate/index?page=content&id=SB10379",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2021-36368": {
      "id": "CVE-2021-36368",
      "references": [
        "https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
        "https://docs.ssh-mitm.at/trivialauth.html",
        "https://github.com/openssh/openssh-portable/pull/258",
        "https://security-tracker.debian.org/tracker/CVE-2021-36368",
        "https://www.openssh.com/security.html",
        "https://bugzilla.mindrot.org/show_bug.cgi?id=3316",
        "https://docs.ssh-mitm.at/trivialauth.html",
        "https://github.com/openssh/openssh-portable/pull/258",
        "https://security-tracker.debian.org/tracker/CVE-2021-36368",
        "https://www.openssh.com/security.html"
      ],
      "score": 3.7,
      "services": [
        "22/ssh"
      ],
      "severity": "low",
      "summary": "An issue was discovered in OpenSSH before 8.9. If a client is using public-key authentication with agent forwarding but without -oLogLevel=verbose, and an attacker has silently modified the server to support the None authentication option, then the user cannot determine whether FIDO authentication is going to confirm that the user wishes to connect to that server, or that the user wishes to allow that server to connect to a different server on the user's behalf. NOTE: the vendor's position is \"this is not an authentication bypass, since nothing is being bypassed.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-287"
    },
    "CVE-2021-39275": {
      "id": "CVE-2021-39275",
      "references": [
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2021-40438": {
      "id": "CVE-2021-40438",
      "references": [
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17",
        "https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37%40%3Cbugs.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029%40%3Cusers.httpd.apache.org%3E",
        "https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00%40%3Cusers.httpd.apache.org%3E",
        "https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211008-0004/",
        "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-httpd-2.4.49-VWL69sWQ",
        "https://www.debian.org/security/2021/dsa-4982",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2021-17"
      ],
      "score": 9,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "CWE-918"
    },
    "CVE-2021-41617": {
      "id": "CVE-2021-41617",
      "references": [
        "https://bugzilla.suse.com/show_bug.cgi?id=1190975",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
        "https://security.netapp.com/advisory/ntap-20211014-0004/",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.8",
        "https://www.openwall.com/lists/oss-security/2021/09/26/1",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.starwindsoftware.com/security/sw-20220805-0001/",
        "https://www.tenable.com/plugins/nessus/154174",
        "https://bugzilla.suse.com/show_bug.cgi?id=1190975",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/",
        "https://security.netapp.com/advisory/ntap-20211014-0004/",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-8.8",
        "https://www.openwall.com/lists/oss-security/2021/09/26/1",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "https://www.starwindsoftware.com/security/sw-20220805-0001/",
        "https://www.tenable.com/plugins/nessus/154174"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2021-44790": {
      "id": "CVE-2021-44790",
      "references": [
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2021/12/20/4",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211224-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.debian.org/security/2022/dsa-5035",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2022-01",
        "https://www.tenable.com/security/tns-2022-03",
        "http://httpd.apache.org/security/vulnerabilities_24.html",
        "http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2021/12/20/4",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20211224-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.debian.org/security/2022/dsa-5035",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujan2022.html",
        "https://www.tenable.com/security/tns-2022-01",
        "https://www.tenable.com/security/tns-2022-03"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-787"
    },
    "CVE-2021-46659": {
      "id": "CVE-2021-46659",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-25631",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220311-0003/",
        "https://jira.mariadb.org/browse/MDEV-25631",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220311-0003/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-46666": {
      "id": "CVE-2021-46666",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-25635",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/",
        "https://jira.mariadb.org/browse/MDEV-25635",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-617"
    },
    "CVE-2021-46667": {
      "id": "CVE-2021-46667",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-26350",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/",
        "https://jira.mariadb.org/browse/MDEV-26350",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2021-46669": {
      "id": "CVE-2021-46669",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-25638",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/",
        "https://jira.mariadb.org/browse/MDEV-25638",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-22719": {
      "id": "CVE-2022-22719",
      "references": [
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-665"
    },
    "CVE-2022-22720": {
      "id": "CVE-2022-22720",
      "references": [
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2022-22721": {
      "id": "CVE-2022-22721",
      "references": [
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html",
        "http://seclists.org/fulldisclosure/2022/May/33",
        "http://seclists.org/fulldisclosure/2022/May/35",
        "http://seclists.org/fulldisclosure/2022/May/38",
        "http://www.openwall.com/lists/oss-security/2022/03/14/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://support.apple.com/kb/HT213255",
        "https://support.apple.com/kb/HT213256",
        "https://support.apple.com/kb/HT213257",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.oracle.com/security-alerts/cpujul2022.html"
      ],
      "score": 9.1,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-23943": {
      "id": "CVE-2022-23943",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/03/14/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.tenable.com/security/tns-2022-08",
        "https://www.tenable.com/security/tns-2022-09",
        "http://www.openwall.com/lists/oss-security/2022/03/14/1",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220321-0001/",
        "https://www.oracle.com/security-alerts/cpuapr2022.html",
        "https://www.tenable.com/security/tns-2022-08",
        "https://www.tenable.com/security/tns-2022-09"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-26377": {
      "id": "CVE-2022-26377",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/2",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-444"
    },
    "CVE-2022-27385": {
      "id": "CVE-2022-27385",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-26415",
        "https://security.netapp.com/advisory/ntap-20220526-0008/",
        "https://jira.mariadb.org/browse/MDEV-26415",
        "https://security.netapp.com/advisory/ntap-20220526-0008/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-89"
    },
    "CVE-2022-27449": {
      "id": "CVE-2022-27449",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-28089",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://security.netapp.com/advisory/ntap-20220526-0006/",
        "https://jira.mariadb.org/browse/MDEV-28089",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://security.netapp.com/advisory/ntap-20220526-0006/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2022-28330": {
      "id": "CVE-2022-28330",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/3",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-125"
    },
    "CVE-2022-28614": {
      "id": "CVE-2022-28614",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/4",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-190"
    },
    "CVE-2022-28615": {
      "id": "CVE-2022-28615",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 9.1,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2022-29404": {
      "id": "CVE-2022-29404",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/5",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/5",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2022-30556": {
      "id": "CVE-2022-30556",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2022-31621": {
      "id": "CVE-2022-31621",
      "references": [
        "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31622": {
      "id": "CVE-2022-31622",
      "references": [
        "https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31623": {
      "id": "CVE-2022-31623",
      "references": [
        "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
        "https://github.com/MariaDB/server/pull/1938",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
        "https://github.com/MariaDB/server/pull/1938",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31624": {
      "id": "CVE-2022-31624",
      "references": [
        "https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
        "https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
        "https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31813": {
      "id": "CVE-2022-31813",
      "references": [
        "http://www.openwall.com/lists/oss-security/2022/06/08/8",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/",
        "http://www.openwall.com/lists/oss-security/2022/06/08/8",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
        "https://security.gentoo.org/glsa/202208-20",
        "https://security.netapp.com/advisory/ntap-20220624-0005/"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-348"
    },
    "CVE-2022-36760": {
      "id": "CVE-2022-36760",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to.  This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2022-37436": {
      "id": "CVE-2022-37436",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 5.3,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "CWE-113"
    },
    "CVE-2023-25690": {
      "id": "CVE-2023-25690",
      "references": [
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01",
        "http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
        "https://security.gentoo.org/glsa/202309-01"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-444"
    },
    "CVE-2023-31122": {
      "id": "CVE-2023-31122",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2023-38408": {
      "id": "CVE-2023-38408",
      "references": [
        "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
        "http://www.openwall.com/lists/oss-security/2023/07/20/1",
        "http://www.openwall.com/lists/oss-security/2023/07/20/2",
        "http://www.openwall.com/lists/oss-security/2023/09/22/11",
        "http://www.openwall.com/lists/oss-security/2023/09/22/9",
        "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
        "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
        "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
        "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
        "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
        "https://news.ycombinator.com/item?id=36790196",
        "https://security.gentoo.org/glsa/202307-01",
        "https://security.netapp.com/advisory/ntap-20230803-0010/",
        "https://support.apple.com/kb/HT213940",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-9.3p2",
        "https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
        "https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408",
        "http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html",
        "http://www.openwall.com/lists/oss-security/2023/07/20/1",
        "http://www.openwall.com/lists/oss-security/2023/07/20/2",
        "http://www.openwall.com/lists/oss-security/2023/09/22/11",
        "http://www.openwall.com/lists/oss-security/2023/09/22/9",
        "https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent",
        "https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8",
        "https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d",
        "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca",
        "https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/",
        "https://news.ycombinator.com/item?id=36790196",
        "https://security.gentoo.org/glsa/202307-01",
        "https://security.netapp.com/advisory/ntap-20230803-0010/",
        "https://support.apple.com/kb/HT213940",
        "https://www.openssh.com/security.html",
        "https://www.openssh.com/txt/release-9.3p2",
        "https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt",
        "https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408"
      ],
      "score": 9.8,
      "services": [
        "22/ssh"
      ],
      "severity": "critical",
      "summary": "The PKCS#11 feature in ssh-agent in OpenSSH before 9.3p2 has an insufficiently trustworthy search path, leading to remote code execution if an agent is forwarded to an attacker-controlled system. (Code in /usr/lib is not necessarily safe for loading into ssh-agent.) NOTE: this issue exists because of an incomplete fix for CVE-2016-10009.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-428"
    },
    "CVE-2023-45802": {
      "id": "CVE-2023-45802",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
        "https://security.netapp.com/advisory/ntap-20231027-0011/"
      ],
      "score": 5.9,
      "services": [
        "80/http"
      ],
      "severity": "medium",
      "summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.nnThis was found by the reporter during testing ofxa0CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.nnUsers are recommended to upgrade to version 2.4.58, which fixes the issue.n",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-770"
    },
    "CVE-2023-48795": {
      "id": "CVE-2023-48795",
      "references": [
        "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/18/3",
        "http://www.openwall.com/lists/oss-security/2023/12/19/5",
        "http://www.openwall.com/lists/oss-security/2023/12/20/3",
        "http://www.openwall.com/lists/oss-security/2024/03/06/3",
        "http://www.openwall.com/lists/oss-security/2024/04/17/8",
        "https://access.redhat.com/security/cve/cve-2023-48795",
        "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
        "https://bugs.gentoo.org/920280",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
        "https://bugzilla.suse.com/show_bug.cgi?id=1217950",
        "https://crates.io/crates/thrussh/versions",
        "https://filezilla-project.org/versions.php",
        "https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
        "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
        "https://github.com/NixOS/nixpkgs/pull/275249",
        "https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
        "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
        "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
        "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
        "https://github.com/advisories/GHSA-45x7-px36-x8w8",
        "https://github.com/apache/mina-sshd/issues/445",
        "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
        "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
        "https://github.com/cyd01/KiTTY/issues/520",
        "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
        "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
        "https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
        "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
        "https://github.com/hierynomus/sshj/issues/916",
        "https://github.com/janmojzis/tinyssh/issues/81",
        "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
        "https://github.com/libssh2/libssh2/pull/1291",
        "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
        "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
        "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
        "https://github.com/mwiede/jsch/issues/457",
        "https://github.com/mwiede/jsch/pull/461",
        "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
        "https://github.com/openssh/openssh-portable/commits/master",
        "https://github.com/paramiko/paramiko/issues/2337",
        "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/issues/456",
        "https://github.com/rapier1/hpn-ssh/releases",
        "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
        "https://github.com/ronf/asyncssh/tags",
        "https://github.com/ssh-mitm/ssh-mitm/issues/165",
        "https://github.com/warp-tech/russh/releases/tag/v0.40.2",
        "https://gitlab.com/libssh/libssh-mirror/-/tags",
        "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
        "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
        "https://help.panic.com/releasenotes/transmit5/",
        "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
        "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
        "https://matt.ucc.asn.au/dropbear/CHANGES",
        "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
        "https://news.ycombinator.com/item?id=38684904",
        "https://news.ycombinator.com/item?id=38685286",
        "https://news.ycombinator.com/item?id=38732005",
        "https://nova.app/releases/#v11.8",
        "https://oryx-embedded.com/download/#changelog",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
        "https://roumenpetrov.info/secsh/#news20231220",
        "https://security-tracker.debian.org/tracker/CVE-2023-48795",
        "https://security-tracker.debian.org/tracker/source-package/libssh2",
        "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
        "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
        "https://security.gentoo.org/glsa/202312-16",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0004/",
        "https://support.apple.com/kb/HT214084",
        "https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
        "https://twitter.com/TrueSkrillor/status/1736774389725565005",
        "https://ubuntu.com/security/CVE-2023-48795",
        "https://winscp.net/eng/docs/history#6.2.2",
        "https://www.bitvise.com/ssh-client-version-history#933",
        "https://www.bitvise.com/ssh-server-version-history",
        "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
        "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.debian.org/security/2023/dsa-5588",
        "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
        "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
        "https://www.netsarang.com/en/xshell-update-history/",
        "https://www.openssh.com/openbsd.html",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "https://www.openwall.com/lists/oss-security/2023/12/20/3",
        "https://www.paramiko.org/changelog.html",
        "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
        "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
        "https://www.terrapin-attack.com",
        "https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
        "https://www.vandyke.com/products/securecrt/history.txt",
        "http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/18/3",
        "http://www.openwall.com/lists/oss-security/2023/12/19/5",
        "http://www.openwall.com/lists/oss-security/2023/12/20/3",
        "http://www.openwall.com/lists/oss-security/2024/03/06/3",
        "http://www.openwall.com/lists/oss-security/2024/04/17/8",
        "https://access.redhat.com/security/cve/cve-2023-48795",
        "https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/",
        "https://bugs.gentoo.org/920280",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2254210",
        "https://bugzilla.suse.com/show_bug.cgi?id=1217950",
        "https://crates.io/crates/thrussh/versions",
        "https://filezilla-project.org/versions.php",
        "https://forum.netgate.com/topic/184941/terrapin-ssh-attack",
        "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6",
        "https://github.com/NixOS/nixpkgs/pull/275249",
        "https://github.com/PowerShell/Win32-OpenSSH/issues/2189",
        "https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta",
        "https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0",
        "https://github.com/TeraTermProject/teraterm/releases/tag/v5.1",
        "https://github.com/advisories/GHSA-45x7-px36-x8w8",
        "https://github.com/apache/mina-sshd/issues/445",
        "https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab",
        "https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22",
        "https://github.com/cyd01/KiTTY/issues/520",
        "https://github.com/drakkan/sftpgo/releases/tag/v2.5.6",
        "https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42",
        "https://github.com/erlang/otp/releases/tag/OTP-26.2.1",
        "https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d",
        "https://github.com/hierynomus/sshj/issues/916",
        "https://github.com/janmojzis/tinyssh/issues/81",
        "https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5",
        "https://github.com/libssh2/libssh2/pull/1291",
        "https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25",
        "https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3",
        "https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15",
        "https://github.com/mwiede/jsch/issues/457",
        "https://github.com/mwiede/jsch/pull/461",
        "https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16",
        "https://github.com/openssh/openssh-portable/commits/master",
        "https://github.com/paramiko/paramiko/issues/2337",
        "https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES",
        "https://github.com/proftpd/proftpd/issues/456",
        "https://github.com/rapier1/hpn-ssh/releases",
        "https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst",
        "https://github.com/ronf/asyncssh/tags",
        "https://github.com/ssh-mitm/ssh-mitm/issues/165",
        "https://github.com/warp-tech/russh/releases/tag/v0.40.2",
        "https://gitlab.com/libssh/libssh-mirror/-/tags",
        "https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ",
        "https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg",
        "https://help.panic.com/releasenotes/transmit5/",
        "https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html",
        "https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html",
        "https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html",
        "https://lists.debian.org/debian-lts-announce/2024/09/msg00042.html",
        "https://lists.debian.org/debian-lts-announce/2024/11/msg00032.html",
        "https://lists.debian.org/debian-lts-announce/2025/04/msg00028.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/",
        "https://lists.fedoraproject.org/archives/list/[email protected]/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/",
        "https://matt.ucc.asn.au/dropbear/CHANGES",
        "https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC",
        "https://news.ycombinator.com/item?id=38684904",
        "https://news.ycombinator.com/item?id=38685286",
        "https://news.ycombinator.com/item?id=38732005",
        "https://nova.app/releases/#v11.8",
        "https://oryx-embedded.com/download/#changelog",
        "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002",
        "https://roumenpetrov.info/secsh/#news20231220",
        "https://security-tracker.debian.org/tracker/CVE-2023-48795",
        "https://security-tracker.debian.org/tracker/source-package/libssh2",
        "https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg",
        "https://security-tracker.debian.org/tracker/source-package/trilead-ssh2",
        "https://security.gentoo.org/glsa/202312-16",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0004/",
        "https://support.apple.com/kb/HT214084",
        "https://thorntech.com/cve-2023-48795-and-sftp-gateway/",
        "https://twitter.com/TrueSkrillor/status/1736774389725565005",
        "https://ubuntu.com/security/CVE-2023-48795",
        "https://winscp.net/eng/docs/history#6.2.2",
        "https://www.bitvise.com/ssh-client-version-history#933",
        "https://www.bitvise.com/ssh-server-version-history",
        "https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html",
        "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.debian.org/security/2023/dsa-5588",
        "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
        "https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508",
        "https://www.netsarang.com/en/xshell-update-history/",
        "https://www.openssh.com/openbsd.html",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "https://www.openwall.com/lists/oss-security/2023/12/20/3",
        "https://www.paramiko.org/changelog.html",
        "https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/",
        "https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/",
        "https://www.terrapin-attack.com",
        "https://www.theregister.com/2023/12/20/terrapin_attack_ssh",
        "https://www.vandyke.com/products/securecrt/history.txt",
        "https://www.vicarius.io/vsociety/posts/cve-2023-48795-detect-openssh-vulnerabilit",
        "https://www.vicarius.io/vsociety/posts/cve-2023-48795-mitigate-openssh-vulnerability"
      ],
      "score": 5.9,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in [email protected] and (if CBC is used) the [email protected] MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-354"
    },
    "CVE-2023-51384": {
      "id": "CVE-2023-51384",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      ],
      "score": 5.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2023-51385": {
      "id": "CVE-2023-51385",
      "references": [
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/26/4",
        "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2",
        "http://seclists.org/fulldisclosure/2024/Mar/21",
        "http://www.openwall.com/lists/oss-security/2023/12/26/4",
        "http://www.openwall.com/lists/oss-security/2025/10/07/1",
        "http://www.openwall.com/lists/oss-security/2025/10/12/1",
        "https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a",
        "https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html",
        "https://security.gentoo.org/glsa/202312-17",
        "https://security.netapp.com/advisory/ntap-20240105-0005/",
        "https://support.apple.com/kb/HT214084",
        "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
        "https://www.debian.org/security/2023/dsa-5586",
        "https://www.openssh.com/txt/release-9.6",
        "https://www.openwall.com/lists/oss-security/2023/12/18/2"
      ],
      "score": 6.5,
      "services": [
        "22/ssh"
      ],
      "severity": "medium",
      "summary": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
      "weakness": "CWE-78"
    },
    "CVE-2023-5157": {
      "id": "CVE-2023-5157",
      "references": [
        "https://access.redhat.com/errata/RHSA-2023:5259",
        "https://access.redhat.com/errata/RHSA-2023:5683",
        "https://access.redhat.com/errata/RHSA-2023:5684",
        "https://access.redhat.com/errata/RHSA-2023:6821",
        "https://access.redhat.com/errata/RHSA-2023:6822",
        "https://access.redhat.com/errata/RHSA-2023:6883",
        "https://access.redhat.com/errata/RHSA-2023:7633",
        "https://access.redhat.com/security/cve/CVE-2023-5157",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2240246",
        "https://access.redhat.com/errata/RHSA-2023:5683",
        "https://access.redhat.com/errata/RHSA-2023:5684",
        "https://access.redhat.com/errata/RHSA-2023:6821",
        "https://access.redhat.com/errata/RHSA-2023:6822",
        "https://access.redhat.com/errata/RHSA-2023:6883",
        "https://access.redhat.com/errata/RHSA-2023:7633",
        "https://access.redhat.com/security/cve/CVE-2023-5157",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2240246"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    },
    "CVE-2023-51767": {
      "id": "CVE-2023-51767",
      "references": [
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767",
        "https://www.openwall.com/lists/oss-security/2025/09/22/1",
        "http://www.openwall.com/lists/oss-security/2025/09/22/1",
        "http://www.openwall.com/lists/oss-security/2025/09/22/2",
        "http://www.openwall.com/lists/oss-security/2025/09/23/4",
        "http://www.openwall.com/lists/oss-security/2025/09/24/4",
        "http://www.openwall.com/lists/oss-security/2025/10/01/1",
        "https://access.redhat.com/security/cve/CVE-2023-51767",
        "https://arxiv.org/abs/2309.02545",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2255850",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77",
        "https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878",
        "https://security.netapp.com/advisory/ntap-20240125-0006/",
        "https://ubuntu.com/security/CVE-2023-51767"
      ],
      "score": 7,
      "services": [
        "22/ssh"
      ],
      "severity": "high",
      "summary": "OpenSSH through 10.0, when common types of DRAM are used, might allow row hammer attacks (for authentication bypass) because the integer value of authenticated in mm_answer_authpassword does not resist flips of a single bit. NOTE: this is applicable to a certain threat model of attacker-victim co-location in which the attacker has user privileges. NOTE: this is disputed by the Supplier, who states \"we do not consider it to be the application's responsibility to defend against platform architectural weaknesses.\"",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2024-38474": {
      "id": "CVE-2024-38474",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-116"
    },
    "CVE-2024-38476": {
      "id": "CVE-2024-38476",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/9",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 9.8,
      "services": [
        "80/http"
      ],
      "severity": "critical",
      "summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-829"
    },
    "CVE-2024-38477": {
      "id": "CVE-2024-38477",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/",
        "http://www.openwall.com/lists/oss-security/2024/07/01/10",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240712-0001/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2024-40898": {
      "id": "CVE-2024-40898",
      "references": [
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "http://www.openwall.com/lists/oss-security/2024/07/17/7",
        "https://httpd.apache.org/security/vulnerabilities_24.html",
        "https://security.netapp.com/advisory/ntap-20240808-0006/"
      ],
      "score": 7.5,
      "services": [
        "80/http"
      ],
      "severity": "high",
      "summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-918"
    }
  }
}