Odin HomeODIN logoODIN logo
PricingJoin us on Discord
TableJSON

Products

Cyble Vision
Cyber threat intelligence platform
Cyble Hawk
Threat detection and intelligence capabilities built for federal bodies
AmIBreached
Identify, Prioritize and Mitigate darkweb risks
The Cyber Express
Cyber Security News and Magazine

Search

HostsExposed BucketsExposed Files

Resources

API DocumentationPlatform GuideODIN CLIPostmanSDKs
GoPythonJavaScript

Contact Us

[email protected]

Legal

Terms of ServiceSecurity Disclosure PolicyPrivacy Policy
Leading Threat Intelligence Company
LinkedInTwitter XYoutube
ODIN logoODIN logo
LinkedInGithubMediumTwitter XYoutube
Launch YC: Odin - Attack surface monitoring and internet scanning for everyone

Made with ❤️ from Cupertino

© 2025 Cyble Inc. All Rights Reserved.

85.128.233.103

SummaryCVE DetailsRaw Data
15 May 2025, 08:25:20 UTC
{
  "scan_id": 1746993504,
  "ip": "85.128.233.103",
  "is_ipv4": true,
  "is_ipv6": false,
  "location": {
    "network": "85.128.128.0/17",
    "postal_code": "",
    "coordinates": {
      "latitude": "52.2394",
      "longitude": "21.0362"
    },
    "geo_point": "52.2394, 21.0362",
    "locale_code": "en",
    "continent": "Europe",
    "country_code": "PL",
    "country_name": "Poland",
    "city": ""
  },
  "location_updated_at": "2025-05-13T08:35:42Z",
  "asn": {
    "number": "AS15967",
    "organization": "Nazwa.pl Sp.z.o.o.",
    "country_code": ""
  },
  "asn_updated_at": "0001-01-01T00:00:00Z",
  "whois": {
    "network": "85.128.128.0/17",
    "organization": "ORG-NPN1-RIPE",
    "descr": "",
    "_encoding": {
      "raw": "BASE64"
    }
  },
  "whois_updated_at": "2024-12-09T11:29:11Z",
  "tags": [
    {
      "name": "is_anonymous_proxy",
      "pretty_name": "Anonymous Proxy",
      "value": false,
      "last_updated_at": "2025-05-13T08:35:42Z"
    },
    {
      "name": "is_cdn",
      "pretty_name": "CDN",
      "value": false,
      "last_updated_at": "2025-05-13T12:06:54Z"
    },
    {
      "name": "is_satellite_provider",
      "pretty_name": "Satellite Provider",
      "value": false,
      "last_updated_at": "2025-05-13T08:35:42Z"
    }
  ],
  "hostnames": [
    {
      "name": "shared-anx103.rev.nazwa.pl",
      "last_updated_at": "2025-05-15T09:34:32.676301944Z"
    }
  ],
  "services": [
    {
      "port": 21,
      "protocol": "tcp",
      "name": "ftp",
      "version": "",
      "product": "ProFTPD",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:proftpd:proftpd",
          "part": "a",
          "vendor": "proftpd",
          "product": "proftpd",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "ftp": {
          "banner": "220 FTP server ready\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://nazwassldvtlsg2r29ca.repository.certum.pl/nazwassldvtlsg2r29ca.cer"
                ],
                "ocsp_urls": [
                  "http://nazwassldvtlsg2r29ca.ocsp"
                ]
              },
              "authority_key_id": "f951fbc94bf32f5cce0f0dc322d9b74b27bcc1aa",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                },
                {
                  "id": "1.2.616.1.113527.2.101.1"
                }
              ],
              "crl_distribution_points": [
                "http://nazwassldvtlsg2r29ca.crl.certum.pl/nazwassldvtlsg2r29ca.crl"
              ],
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.nazwa.pl",
                  "nazwa.pl"
                ]
              }
            },
            "fingerprint_md5": "2B825680DA2B5A7ACF3E1CA92A049421",
            "fingerprint_sha1": "65EE65EFF485B79E61FFDBE8E647675886C3D317",
            "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
            "issuer": {
              "common_name": [
                "nazwaSSL DV TLS G2 R29 CA"
              ],
              "country": [
                "PL"
              ],
              "organization": [
                "nazwa.pl Sp. z o.o."
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-05-19T14:13:30",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-05-19T20:37:08",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "22839125848591996675343824150803531785",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100c1719a3cd863582017b8462dc415e1e326b9702a862232d10a5166a36648131b022100eeb58116308bf7db8b06c259e7f3ca7a1f8888205e27186b9dbf830d48d9ce66"
                },
                "timestamp": "2025-01-17T09:07:12.814000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100b832d523be6ff295b2d1e23d9e44b54a45e4e66013f94b3e8997c36ca83d2f13022065351cfbbc0f987ddcae7a8b300edfcda086d30c2acfa5d76fb4c3a6161405b0"
                },
                "timestamp": "2025-01-17T09:07:12.821000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502200e092632f2fc898e393f606e78ac11cfa05940479deaa971f291728df85492c0022100cb8104f418b6e8721fa3208e50013b09f099a51f4951fb8a4ae71a10d7ba10fa"
                },
                "timestamp": "2025-01-17T09:07:12.840000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.nazwa.pl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.nazwa.pl",
                "nazwa.pl"
              ],
              "extended_dns_names": [
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "subdomain": "*",
                  "tld": "pl"
                },
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "tld": "pl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e7fe02849ba508164a55f444142089b36a54a39b32b390e97bffaa859c4cdd00",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "15e4a04a2b0b546fecd9af2f78eb6877655377c396fbb09aa763ffda2ad8a8e8",
            "tbs_noct_fingerprint": "b462dc8b529884d17b879907fb9442a8d163916f8074cb2d0942683a4afffcfe",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31416768,
              "not_after": "2026-01-16T00:00:00",
              "not_before": "2025-01-17T09:07:12"
            },
            "version": 2
          },
          "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
          "precert": false,
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-12T21:29:54.786Z"
    },
    {
      "port": 25,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 ams1-r02b04-23-cf1 ESMTP ready\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://nazwassldvtlsg2r29ca.repository.certum.pl/nazwassldvtlsg2r29ca.cer"
                ],
                "ocsp_urls": [
                  "http://nazwassldvtlsg2r29ca.ocsp"
                ]
              },
              "authority_key_id": "f951fbc94bf32f5cce0f0dc322d9b74b27bcc1aa",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                },
                {
                  "id": "1.2.616.1.113527.2.101.1"
                }
              ],
              "crl_distribution_points": [
                "http://nazwassldvtlsg2r29ca.crl.certum.pl/nazwassldvtlsg2r29ca.crl"
              ],
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.nazwa.pl",
                  "nazwa.pl"
                ]
              }
            },
            "fingerprint_md5": "2B825680DA2B5A7ACF3E1CA92A049421",
            "fingerprint_sha1": "65EE65EFF485B79E61FFDBE8E647675886C3D317",
            "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
            "issuer": {
              "common_name": [
                "nazwaSSL DV TLS G2 R29 CA"
              ],
              "country": [
                "PL"
              ],
              "organization": [
                "nazwa.pl Sp. z o.o."
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-05-22T06:13:50",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-05-22T07:50:03",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "22839125848591996675343824150803531785",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100c1719a3cd863582017b8462dc415e1e326b9702a862232d10a5166a36648131b022100eeb58116308bf7db8b06c259e7f3ca7a1f8888205e27186b9dbf830d48d9ce66"
                },
                "timestamp": "2025-01-17T09:07:12.814000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100b832d523be6ff295b2d1e23d9e44b54a45e4e66013f94b3e8997c36ca83d2f13022065351cfbbc0f987ddcae7a8b300edfcda086d30c2acfa5d76fb4c3a6161405b0"
                },
                "timestamp": "2025-01-17T09:07:12.821000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502200e092632f2fc898e393f606e78ac11cfa05940479deaa971f291728df85492c0022100cb8104f418b6e8721fa3208e50013b09f099a51f4951fb8a4ae71a10d7ba10fa"
                },
                "timestamp": "2025-01-17T09:07:12.840000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.nazwa.pl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.nazwa.pl",
                "nazwa.pl"
              ],
              "extended_dns_names": [
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "subdomain": "*",
                  "tld": "pl"
                },
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "tld": "pl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e7fe02849ba508164a55f444142089b36a54a39b32b390e97bffaa859c4cdd00",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "15e4a04a2b0b546fecd9af2f78eb6877655377c396fbb09aa763ffda2ad8a8e8",
            "tbs_noct_fingerprint": "b462dc8b529884d17b879907fb9442a8d163916f8074cb2d0942683a4afffcfe",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31416768,
              "not_after": "2026-01-16T00:00:00",
              "not_before": "2025-01-17T09:07:12"
            },
            "version": 2
          },
          "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
          "precert": false,
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-15T08:25:20.45Z"
    },
    {
      "port": 80,
      "protocol": "tcp",
      "name": "http",
      "version": "1.16.1",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.16.1",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.16\\.1",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": -91588357,
          "body_sha256": "bc8fa0f53c827333b8f052c231edd1bd563e2db5b69b0721b45019a14b5d7fac",
          "component": [
            "Apache HTTP Server:2"
          ],
          "content_length": -1,
          "favicon": {
            "md5_hash": "502975b60f3fd85d62a7ae29372505e3",
            "murmur_hash": -1598789621,
            "path": "http://85.128.233.103:80/favicon.ico",
            "size": 4286
          },
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html; charset=UTF-8"
            ],
            "date": [
              "Wed, 07 May 2025 23:33:40 GMT"
            ],
            "server": [
              "Apache/2"
            ],
            "unknown": [
              {
                "key": "x_cdn_nazwa.pl_location",
                "value": [
                  "AMS"
                ]
              },
              {
                "key": "x_cdn_nazwa.pl_policyused",
                "value": [
                  "cdn=1209600"
                ]
              },
              {
                "key": "x_cdn_nazwa.pl_cache",
                "value": [
                  "HIT"
                ]
              }
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Domena  jest utrzymywana na serwerach nazwa.pl",
          "transfer_encoding": [
            "chunked"
          ]
        }
      },
      "url": "http://85.128.233.103/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-07T23:33:41.242Z"
    },
    {
      "port": 110,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Zimbra Collabration Suite pop3d",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:zimbra:zimbra_collaboration_suite",
          "part": "a",
          "vendor": "zimbra",
          "product": "zimbra_collaboration_suite",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "pop3": {
          "banner": "+OK POP3 ready\r\n"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-11T16:40:13.655Z"
    },
    {
      "port": 143,
      "protocol": "tcp",
      "name": "imap-proxy",
      "version": "",
      "product": "nginx imap proxy",
      "extra_info": "",
      "tunnel": "",
      "modules": {
        "imap": {
          "banner": "* OK IMAP4 ready\r\n"
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-15T03:42:59.214Z"
    },
    {
      "port": 443,
      "protocol": "tcp",
      "name": "http",
      "version": "1.16.1",
      "product": "nginx",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:igor_sysoev:nginx:1.16.1",
          "part": "a",
          "vendor": "igor_sysoev",
          "product": "nginx",
          "version": "1\\.16\\.1",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "http": {
          "body_murmur": 281074306,
          "body_sha256": "375b526832a419b8af0a7ef0d29972afb102ca294e9f194a55007738674f8600",
          "component": [
            "Apache HTTP Server:2"
          ],
          "content_length": -1,
          "favicon": {
            "md5_hash": "502975b60f3fd85d62a7ae29372505e3",
            "murmur_hash": -1598789621,
            "path": "https://85.128.233.103:443/favicon.ico",
            "size": 4286
          },
          "headers": {
            "connection": [
              "keep-alive"
            ],
            "content_type": [
              "text/html; charset=UTF-8"
            ],
            "date": [
              "Wed, 30 Apr 2025 09:38:33 GMT"
            ],
            "server": [
              "Apache/2"
            ],
            "unknown": [
              {
                "key": "x_cdn_nazwa.pl_cache",
                "value": [
                  "HIT"
                ]
              },
              {
                "key": "x_cdn_nazwa.pl_location",
                "value": [
                  "AMS"
                ]
              },
              {
                "key": "x_cdn_nazwa.pl_policyused",
                "value": [
                  "cdn=1209600"
                ]
              }
            ]
          },
          "protocol": "HTTP/1.1",
          "status_code": 200,
          "title": "Domena  jest utrzymywana na serwerach nazwa.pl",
          "transfer_encoding": [
            "chunked"
          ]
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://nazwassldvtlsg2r29ca.repository.certum.pl/nazwassldvtlsg2r29ca.cer"
                ],
                "ocsp_urls": [
                  "http://nazwassldvtlsg2r29ca.ocsp"
                ]
              },
              "authority_key_id": "f951fbc94bf32f5cce0f0dc322d9b74b27bcc1aa",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                },
                {
                  "id": "1.2.616.1.113527.2.101.1"
                }
              ],
              "crl_distribution_points": [
                "http://nazwassldvtlsg2r29ca.crl.certum.pl/nazwassldvtlsg2r29ca.crl"
              ],
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.nazwa.pl",
                  "nazwa.pl"
                ]
              }
            },
            "fingerprint_md5": "2B825680DA2B5A7ACF3E1CA92A049421",
            "fingerprint_sha1": "65EE65EFF485B79E61FFDBE8E647675886C3D317",
            "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
            "issuer": {
              "common_name": [
                "nazwaSSL DV TLS G2 R29 CA"
              ],
              "country": [
                "PL"
              ],
              "organization": [
                "nazwa.pl Sp. z o.o."
              ]
            },
            "jarm": "29d29d16d29d29d00042d42d0000005fd00fabd213a5ac89229012f70afd5c",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-05-14T14:13:50",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-05-14T15:29:20",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "22839125848591996675343824150803531785",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100c1719a3cd863582017b8462dc415e1e326b9702a862232d10a5166a36648131b022100eeb58116308bf7db8b06c259e7f3ca7a1f8888205e27186b9dbf830d48d9ce66"
                },
                "timestamp": "2025-01-17T09:07:12.814000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100b832d523be6ff295b2d1e23d9e44b54a45e4e66013f94b3e8997c36ca83d2f13022065351cfbbc0f987ddcae7a8b300edfcda086d30c2acfa5d76fb4c3a6161405b0"
                },
                "timestamp": "2025-01-17T09:07:12.821000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502200e092632f2fc898e393f606e78ac11cfa05940479deaa971f291728df85492c0022100cb8104f418b6e8721fa3208e50013b09f099a51f4951fb8a4ae71a10d7ba10fa"
                },
                "timestamp": "2025-01-17T09:07:12.840000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.nazwa.pl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.nazwa.pl",
                "nazwa.pl"
              ],
              "extended_dns_names": [
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "subdomain": "*",
                  "tld": "pl"
                },
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "tld": "pl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e7fe02849ba508164a55f444142089b36a54a39b32b390e97bffaa859c4cdd00",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "15e4a04a2b0b546fecd9af2f78eb6877655377c396fbb09aa763ffda2ad8a8e8",
            "tbs_noct_fingerprint": "b462dc8b529884d17b879907fb9442a8d163916f8074cb2d0942683a4afffcfe",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31416768,
              "not_after": "2026-01-16T00:00:00",
              "not_before": "2025-01-17T09:07:12"
            },
            "version": 2
          },
          "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
          "precert": false,
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "url": "https://85.128.233.103/",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-07T15:42:36.443Z"
    },
    {
      "port": 465,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "",
      "extra_info": "",
      "tunnel": "ssl",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-03T21:57:26.901Z"
    },
    {
      "port": 587,
      "protocol": "tcp",
      "name": "smtp",
      "version": "",
      "product": "Postfix smtpd",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postfix:postfix",
          "part": "a",
          "vendor": "postfix",
          "product": "postfix",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "smtp": {
          "banner": "220 ams1-r02b04-20-cf2 ESMTP ready\r\n"
        },
        "tls": {
          "certificate": {
            "extensions": {
              "authority_info_access": {
                "issuer_urls": [
                  "http://nazwassldvtlsg2r29ca.repository.certum.pl/nazwassldvtlsg2r29ca.cer"
                ],
                "ocsp_urls": [
                  "http://nazwassldvtlsg2r29ca.ocsp"
                ]
              },
              "authority_key_id": "f951fbc94bf32f5cce0f0dc322d9b74b27bcc1aa",
              "basic_constraints": {
                "is_ca": true
              },
              "certificate_policies": [
                {
                  "id": "2.23.140.1.2.1"
                },
                {
                  "id": "1.2.616.1.113527.2.101.1"
                }
              ],
              "crl_distribution_points": [
                "http://nazwassldvtlsg2r29ca.crl.certum.pl/nazwassldvtlsg2r29ca.crl"
              ],
              "extended_key_usage": {
                "any": false,
                "apple_code_signing": false,
                "apple_code_signing_development": false,
                "apple_code_signing_third_party": false,
                "apple_crypto_development_env": false,
                "apple_crypto_env": false,
                "apple_crypto_maintenance_env": false,
                "apple_crypto_production_env": false,
                "apple_crypto_qos": false,
                "apple_crypto_test_env": false,
                "apple_crypto_tier0_qos": false,
                "apple_crypto_tier1_qos": false,
                "apple_crypto_tier2_qos": false,
                "apple_crypto_tier3_qos": false,
                "apple_ichat_encryption": false,
                "apple_ichat_signing": false,
                "apple_resource_signing": false,
                "apple_software_update_signing": false,
                "apple_system_identity": false,
                "client_auth": true,
                "code_signing": false,
                "dvcs": false,
                "eap_over_lan": false,
                "eap_over_ppp": false,
                "email_protection": false,
                "ipsec_end_system": false,
                "ipsec_intermediate_system_usage": false,
                "ipsec_tunnel": false,
                "ipsec_user": false,
                "microsoft_ca_exchange": false,
                "microsoft_cert_trust_list_signing": false,
                "microsoft_csp_signature": false,
                "microsoft_document_signing": false,
                "microsoft_drm": false,
                "microsoft_drm_individualization": false,
                "microsoft_efs_recovery": false,
                "microsoft_embedded_nt_crypto": false,
                "microsoft_encrypted_file_system": false,
                "microsoft_enrollment_agent": false,
                "microsoft_kernel_mode_code_signing": false,
                "microsoft_key_recovery_21": false,
                "microsoft_key_recovery_3": false,
                "microsoft_license_server": false,
                "microsoft_licenses": false,
                "microsoft_lifetime_signing": false,
                "microsoft_mobile_device_software": false,
                "microsoft_nt5_crypto": false,
                "microsoft_oem_whql_crypto": false,
                "microsoft_qualified_subordinate": false,
                "microsoft_root_list_signer": false,
                "microsoft_server_gated_crypto": false,
                "microsoft_sgc_serialized": false,
                "microsoft_smart_display": false,
                "microsoft_smartcard_logon": false,
                "microsoft_system_health": false,
                "microsoft_system_health_loophole": false,
                "microsoft_timestamp_signing": false,
                "microsoft_whql_crypto": false,
                "netscape_server_gated_crypto": false,
                "ocsp_signing": false,
                "sbgp_cert_aa_service_auth": false,
                "server_auth": true,
                "time_stamping": false
              },
              "key_usage": {
                "certificate_sign": false,
                "content_commitment": false,
                "crl_sign": false,
                "data_encipherment": false,
                "decipher_only": false,
                "digital_signature": true,
                "encipher_only": false,
                "key_agreement": false,
                "key_encipherment": true
              },
              "subject_alt_name": {
                "dns_names": [
                  "*.nazwa.pl",
                  "nazwa.pl"
                ]
              }
            },
            "fingerprint_md5": "2B825680DA2B5A7ACF3E1CA92A049421",
            "fingerprint_sha1": "65EE65EFF485B79E61FFDBE8E647675886C3D317",
            "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
            "issuer": {
              "common_name": [
                "nazwaSSL DV TLS G2 R29 CA"
              ],
              "country": [
                "PL"
              ],
              "organization": [
                "nazwa.pl Sp. z o.o."
              ]
            },
            "jarm": "00000000000000000000000000000000000000000000000000000000000000",
            "redacted": false,
            "revocation": {
              "crl": {
                "next_update": "2025-05-12T06:13:40",
                "reason": "UNKNOWN",
                "revoked": false
              },
              "ocsp": {
                "next_update": "2025-05-12T06:47:52",
                "reason": "UNKNOWN",
                "revoked": false
              }
            },
            "serial_number": "22839125848591996675343824150803531785",
            "signature": {
              "algorithm": {
                "name": "SHA256-RSA",
                "oid": "1.2.840.113549.1.1.11"
              },
              "self_signed": false
            },
            "signed_certificate_timestamps": [
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "1986d4c728aa6ffeba036f782a4d0191aace2d72310faece5d70412d254cc7d4",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3046022100c1719a3cd863582017b8462dc415e1e326b9702a862232d10a5166a36648131b022100eeb58116308bf7db8b06c259e7f3ca7a1f8888205e27186b9dbf830d48d9ce66"
                },
                "timestamp": "2025-01-17T09:07:12.814000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "0e5794bcf3aea93e331b2c9907b3f790df9bc23d713225dd21a925ac61c54e21",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "3045022100b832d523be6ff295b2d1e23d9e44b54a45e4e66013f94b3e8997c36ca83d2f13022065351cfbbc0f987ddcae7a8b300edfcda086d30c2acfa5d76fb4c3a6161405b0"
                },
                "timestamp": "2025-01-17T09:07:12.821000",
                "version": "v1"
              },
              {
                "entry_type": "PRE_CERTIFICATE",
                "log_id": "6411c46ca412eca7891ca2022e00bcab4f2807d41e3527abeafed503c97dcdf0",
                "signature": {
                  "algorithm": "ECDSA",
                  "hash_algorithm": "SHA256",
                  "value": "304502200e092632f2fc898e393f606e78ac11cfa05940479deaa971f291728df85492c0022100cb8104f418b6e8721fa3208e50013b09f099a51f4951fb8a4ae71a10d7ba10fa"
                },
                "timestamp": "2025-01-17T09:07:12.840000",
                "version": "v1"
              }
            ],
            "signed_certificate_timestamps_oid": "1.3.6.1.4.1.11129.2.4.2",
            "subject": {
              "common_name": [
                "*.nazwa.pl"
              ]
            },
            "subject_alt_name": {
              "dns_names": [
                "*.nazwa.pl",
                "nazwa.pl"
              ],
              "extended_dns_names": [
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "subdomain": "*",
                  "tld": "pl"
                },
                {
                  "domain": "nazwa",
                  "fld": "nazwa.pl",
                  "tld": "pl"
                }
              ]
            },
            "subject_key_info": {
              "_key": "rsa",
              "dh": [],
              "dsa": [],
              "ecdsa": [],
              "fingerprint_sha256": "e7fe02849ba508164a55f444142089b36a54a39b32b390e97bffaa859c4cdd00",
              "key_algorithm": "RSA",
              "rsa": {
                "exponent": 65537,
                "length": 2048
              }
            },
            "tbs_fingerprint": "15e4a04a2b0b546fecd9af2f78eb6877655377c396fbb09aa763ffda2ad8a8e8",
            "tbs_noct_fingerprint": "b462dc8b529884d17b879907fb9442a8d163916f8074cb2d0942683a4afffcfe",
            "validation_level": "DV",
            "validity": {
              "length_seconds": 31416768,
              "not_after": "2026-01-16T00:00:00",
              "not_before": "2025-01-17T09:07:12"
            },
            "version": 2
          },
          "fingerprint_sha256": "27CE5B367834A10AC3F4A63405A19DB6292527C7EA80B93826F578DBB041B2A5",
          "precert": false,
          "tags": [
            "dv",
            "trusted"
          ]
        }
      },
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-05T07:10:19.344Z"
    },
    {
      "port": 993,
      "protocol": "tcp",
      "name": "imap-proxy",
      "version": "",
      "product": "nginx imap proxy",
      "extra_info": "",
      "tunnel": "ssl",
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-12T04:26:05.197Z"
    },
    {
      "port": 995,
      "protocol": "tcp",
      "name": "pop3",
      "version": "",
      "product": "Zimbra Collabration Suite pop3d",
      "extra_info": "",
      "tunnel": "ssl",
      "softwares": [
        {
          "uri": "cpe:/a:zimbra:zimbra_collaboration_suite",
          "part": "a",
          "vendor": "zimbra",
          "product": "zimbra_collaboration_suite",
          "version": "ANY",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-15T01:08:14.875Z"
    },
    {
      "port": 3306,
      "protocol": "tcp",
      "name": "mysql",
      "version": "5.5.5-10.1.48",
      "product": "MariaDB",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:mariadb:mariadb:5.5.5-10.1.48",
          "part": "a",
          "vendor": "mariadb",
          "product": "mariadb",
          "version": "5\\.5\\.5\\-10\\.1\\.48",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "mysql": {
          "capability_flags": {
            "CLIENT_COMPRESS": true,
            "CLIENT_CONNECT_ATTRS": true,
            "CLIENT_CONNECT_WITH_DB": true,
            "CLIENT_FOUND_ROWS": true,
            "CLIENT_IGNORE_SIGPIPE": true,
            "CLIENT_IGNORE_SPACE": true,
            "CLIENT_INTERACTIVE": true,
            "CLIENT_LOCAL_FILES": true,
            "CLIENT_LONG_FLAG": true,
            "CLIENT_LONG_PASSWORD": true,
            "CLIENT_MULTI_RESULTS": true,
            "CLIENT_MULTI_STATEMENTS": true,
            "CLIENT_NO_SCHEMA": true,
            "CLIENT_ODBC": true,
            "CLIENT_PLUGIN_AUTH": true,
            "CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
            "CLIENT_PROTOCOL_41": true,
            "CLIENT_PS_MULTI_RESULTS": true,
            "CLIENT_RESERVED": true,
            "CLIENT_SECURE_CONNECTION": true,
            "CLIENT_TRANSACTIONS": true
          },
          "protocol_version": 10,
          "version": "5.5.5-10.1.48-MariaDB"
        }
      },
      "cve": [
        {
          "id": "CVE-2005-0004",
          "severity": "medium"
        },
        {
          "id": "CVE-2012-0540",
          "severity": "medium"
        },
        {
          "id": "CVE-2012-0572",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-09T11:52:39.983Z"
    },
    {
      "port": 5432,
      "protocol": "tcp",
      "name": "postgresql",
      "version": "9.3.21 - 9.3.25",
      "product": "PostgreSQL DB",
      "extra_info": "",
      "tunnel": "",
      "softwares": [
        {
          "uri": "cpe:/a:postgresql:postgresql:9.3",
          "part": "a",
          "vendor": "postgresql",
          "product": "postgresql",
          "version": "9\\.3",
          "language": "ANY",
          "edition": "ANY",
          "update": "ANY"
        }
      ],
      "modules": {
        "postgres": {
          "errors": [
            {
              "code": "0A000",
              "file": "postmaster.c",
              "line": "1994",
              "message": "unsupported frontend protocol 255.255: server supports 1.0 to 3.0",
              "routine": "ProcessStartupPacket",
              "severity": "FATAL"
            },
            {
              "code": "",
              "file": "ATAL:  unsupported frontend protocol 0.0: server supports 1.0 to 3.0\n",
              "line": "",
              "message": "",
              "routine": "",
              "severity": ""
            },
            {
              "code": "",
              "file": "ATAL:  unsupported frontend protocol 0.0: server supports 1.0 to 3.0\n",
              "line": "",
              "message": "",
              "routine": "",
              "severity": ""
            }
          ],
          "is_ssl": false,
          "supported_versions": "FATAL:  unsupported frontend protocol 0.0: server supports 1.0 to 3.0"
        }
      },
      "cve": [
        {
          "id": "CVE-2014-0060",
          "severity": "medium"
        },
        {
          "id": "CVE-2014-0061",
          "severity": "medium"
        },
        {
          "id": "CVE-2014-0062",
          "severity": "medium"
        }
      ],
      "_meta": {
        "name": "",
        "desc": "",
        "category": ""
      },
      "last_updated_at": "2025-05-12T06:12:29.548Z"
    }
  ],
  "services_hash": "9899d26318a471f1edff6fd9b361005d6c9285064e3e9c912ecc27c752eddba2",
  "last_updated_at": "2025-05-15T08:25:20.45Z",
  "banner": [
    "ftp",
    "tls",
    "smtp",
    "pop3",
    "imap",
    "mysql",
    "postgres",
    "http"
  ],
  "is_vuln": true,
  "cveDetails": {
    "CVE-2005-0004": {
      "id": "CVE-2005-0004",
      "references": [
        "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
        "http://lists.mysql.com/internals/20600",
        "http://marc.info/?l=bugtraq&m=110608297217224&w=2",
        "http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
        "http://secunia.com/advisories/13867",
        "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
        "http://www.debian.org/security/2005/dsa-647",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
        "http://www.securityfocus.com/bid/12277",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/18922",
        "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947",
        "http://lists.mysql.com/internals/20600",
        "http://marc.info/?l=bugtraq&m=110608297217224&w=2",
        "http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html",
        "http://secunia.com/advisories/13867",
        "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1",
        "http://www.debian.org/security/2005/dsa-647",
        "http://www.mandriva.com/security/advisories?name=MDKSA-2005:036",
        "http://www.securityfocus.com/bid/12277",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/18922"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-59"
    },
    "CVE-2012-0540": {
      "id": "CVE-2012-0540",
      "references": [
        "http://osvdb.org/83976",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54551",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77061",
        "http://osvdb.org/83976",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54551",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77061"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier and 5.5.23 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0572": {
      "id": "CVE-2012-0572",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16792"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0574": {
      "id": "CVE-2012-0574",
      "references": [
        "http://marc.info/?l=bugtraq&m=135109152819176&w=2",
        "http://marc.info/?l=bugtraq&m=135109152819176&w=2",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266",
        "http://marc.info/?l=bugtraq&m=135109152819176&w=2",
        "http://marc.info/?l=bugtraq&m=135109152819176&w=2",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17266"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-0578": {
      "id": "CVE-2012-0578",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16947"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1688": {
      "id": "CVE-2012-1688",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53067",
        "http://www.securitytracker.com/id?1026934",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53067",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability, related to Server DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1689": {
      "id": "CVE-2012-1689",
      "references": [
        "http://osvdb.org/83980",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54547",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77065",
        "http://osvdb.org/83980",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54547",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77065"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1690": {
      "id": "CVE-2012-1690",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53074",
        "http://www.securitytracker.com/id?1026934",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53074",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1703.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1697": {
      "id": "CVE-2012-1697",
      "references": [
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53064",
        "http://www.securitytracker.com/id?1026934",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53064",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.21 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1702": {
      "id": "CVE-2012-1702",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17186"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote attackers to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1703": {
      "id": "CVE-2012-1703",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53058",
        "http://www.securitytracker.com/id?1026934",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/48890",
        "http://secunia.com/advisories/49179",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
        "http://www.securityfocus.com/bid/53058",
        "http://www.securitytracker.com/id?1026934"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.61 and earlier, and 5.5.21 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer, a different vulnerability than CVE-2012-1690.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1705": {
      "id": "CVE-2012-1705",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17268"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1734": {
      "id": "CVE-2012-1734",
      "references": [
        "http://osvdb.org/83979",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54540",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77064",
        "http://osvdb.org/83979",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54540",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77064"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1735": {
      "id": "CVE-2012-1735",
      "references": [
        "http://osvdb.org/83975",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54549",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77060",
        "http://osvdb.org/83975",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54549",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77060"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1756": {
      "id": "CVE-2012-1756",
      "references": [
        "http://osvdb.org/83978",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54524",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77063",
        "http://osvdb.org/83978",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54524",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77063"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-1757": {
      "id": "CVE-2012-1757",
      "references": [
        "http://osvdb.org/83977",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54526",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77062",
        "http://osvdb.org/83977",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
        "http://www.securityfocus.com/bid/54526",
        "http://www.securitytracker.com/id?1027263",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/77062"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-2750": {
      "id": "CVE-2012-2750",
      "references": [
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.securityfocus.com/bid/63125",
        "http://www.securitytracker.com/id/1029184",
        "https://bugzilla.redhat.com/show_bug.cgi?id=833742",
        "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-23.html",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.securityfocus.com/bid/63125",
        "http://www.securitytracker.com/id/1029184",
        "https://bugzilla.redhat.com/show_bug.cgi?id=833742"
      ],
      "score": 10,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in MySQL 5.5.x before 5.5.23 has unknown impact and attack vectors related to a \"Security Fix\", aka Bug #59533. NOTE: this might be a duplicate of CVE-2012-1689, but as of 20120816, Oracle has not commented on this possibility.",
      "vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3150": {
      "id": "CVE-2012-3150",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79388",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79388"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3158": {
      "id": "CVE-2012-3158",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79382",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79382"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3160": {
      "id": "CVE-2012-3160",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79394",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79394"
      ],
      "score": 2.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows local users to affect confidentiality via unknown vectors related to Server Installation.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3163": {
      "id": "CVE-2012-3163",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/56509",
        "http://secunia.com/advisories/56513",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79381",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/56509",
        "http://secunia.com/advisories/56513",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14907.html",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79381"
      ],
      "score": 9,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3166": {
      "id": "CVE-2012-3166",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3167": {
      "id": "CVE-2012-3167",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79392",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79392"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Full Text Search.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3173": {
      "id": "CVE-2012-3173",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79386",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79386"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.63 and earlier, and 5.5.25 and earlier, allows remote authenticated users to affect availability via unknown vectors related to InnoDB Plugin.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3177": {
      "id": "CVE-2012-3177",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79383",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79383"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3180": {
      "id": "CVE-2012-3180",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79389",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79389"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.65 and earlier, and 5.5.27 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-3197": {
      "id": "CVE-2012-3197",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79393",
        "http://rhn.redhat.com/errata/RHSA-2012-1462.html",
        "http://secunia.com/advisories/51177",
        "http://secunia.com/advisories/51309",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2012/dsa-2581",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html",
        "http://www.ubuntu.com/usn/USN-1621-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/79393"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5060": {
      "id": "CVE-2012-5060",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5096": {
      "id": "CVE-2012-5096",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16877"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users with Server Privileges to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5612": {
      "id": "CVE-2012-5612",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
        "http://seclists.org/fulldisclosure/2012/Dec/5",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.exploit-db.com/exploits/23076",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://mariadb.atlassian.net/browse/MDEV-3908",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960",
        "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00000.html",
        "http://seclists.org/fulldisclosure/2012/Dec/5",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.exploit-db.com/exploits/23076",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://mariadb.atlassian.net/browse/MDEV-3908",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16960"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-787"
    },
    "CVE-2012-5614": {
      "id": "CVE-2012-5614",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://seclists.org/fulldisclosure/2012/Dec/7",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://www.securitytracker.com/id?1027829",
        "https://bugzilla.redhat.com/show_bug.cgi?id=882607",
        "https://mariadb.atlassian.net/browse/MDEV-3910",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://seclists.org/fulldisclosure/2012/Dec/7",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.openwall.com/lists/oss-security/2012/12/02/3",
        "http://www.openwall.com/lists/oss-security/2012/12/02/4",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://www.securitytracker.com/id?1027829",
        "https://bugzilla.redhat.com/show_bug.cgi?id=882607",
        "https://mariadb.atlassian.net/browse/MDEV-3910"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2012-5627": {
      "id": "CVE-2012-5627",
      "references": [
        "http://seclists.org/fulldisclosure/2012/Dec/58",
        "http://seclists.org/fulldisclosure/2012/Dec/83",
        "http://seclists.org/oss-sec/2012/q4/424",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "https://bugzilla.redhat.com/show_bug.cgi?id=883719",
        "https://mariadb.atlassian.net/browse/MDEV-3915",
        "http://seclists.org/fulldisclosure/2012/Dec/58",
        "http://seclists.org/fulldisclosure/2012/Dec/83",
        "http://seclists.org/oss-sec/2012/q4/424",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:102",
        "https://bugzilla.redhat.com/show_bug.cgi?id=883719",
        "https://mariadb.atlassian.net/browse/MDEV-3915"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
      "weakness": "CWE-522"
    },
    "CVE-2013-0367": {
      "id": "CVE-2013-0367",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17077"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0368": {
      "id": "CVE-2013-0368",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17255"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0371": {
      "id": "CVE-2013-0371",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16451"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability, related to MyISAM.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0383": {
      "id": "CVE-2013-0383",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16758"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote attackers to affect availability via unknown vectors related to Server Locking.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0384": {
      "id": "CVE-2013-0384",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16632"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0385": {
      "id": "CVE-2013-0385",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16267"
      ],
      "score": 6.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows local users to affect confidentiality and integrity via unknown vectors related to Server Replication.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0386": {
      "id": "CVE-2013-0386",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16835"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.5.28 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-0389": {
      "id": "CVE-2013-0389",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825",
        "http://rhn.redhat.com/errata/RHSA-2013-0219.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html",
        "http://www.ubuntu.com/usn/USN-1703-1",
        "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16825"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.5.28 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1502": {
      "id": "CVE-2013-1502",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 1.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.9 and earlier allows local users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:L/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1506": {
      "id": "CVE-2013-1506",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Locking.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1511": {
      "id": "CVE-2013-1511",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1512": {
      "id": "CVE-2013-1512",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1521": {
      "id": "CVE-2013-1521",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Locking.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1523": {
      "id": "CVE-2013-1523",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1526": {
      "id": "CVE-2013-1526",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.29 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1531": {
      "id": "CVE-2013-1531",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.66 and earlier and 5.5.28 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server Privileges.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1532": {
      "id": "CVE-2013-1532",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1544": {
      "id": "CVE-2013-1544",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1548": {
      "id": "CVE-2013-1548",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.63 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Types.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1552": {
      "id": "CVE-2013-1552",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1555": {
      "id": "CVE-2013-1555",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, and 5.5.29 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-1861": {
      "id": "CVE-2013-1861",
      "references": [
        "http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://seclists.org/oss-sec/2013/q1/671",
        "http://secunia.com/advisories/52639",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.osvdb.org/91415",
        "http://www.securityfocus.com/bid/58511",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=919247",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
        "https://mariadb.atlassian.net/browse/MDEV-4252",
        "http://lists.askmonty.org/pipermail/commits/2013-March/004371.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://seclists.org/oss-sec/2013/q1/671",
        "http://secunia.com/advisories/52639",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.osvdb.org/91415",
        "http://www.securityfocus.com/bid/58511",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=919247",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/82895",
        "https://mariadb.atlassian.net/browse/MDEV-4252"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2013-2375": {
      "id": "CVE-2013-2375",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2376": {
      "id": "CVE-2013-2376",
      "references": [
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.30 and earlier and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Stored Procedure.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2378": {
      "id": "CVE-2013-2378",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.67 and earlier, 5.5.29 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Information Schema.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2389": {
      "id": "CVE-2013-2389",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2391": {
      "id": "CVE-2013-2391",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows local users to affect confidentiality and integrity via unknown vectors related to Server Install.",
      "vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-2392": {
      "id": "CVE-2013-2392",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html",
        "http://rhn.redhat.com/errata/RHSA-2013-0772.html",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3783": {
      "id": "CVE-2013-3783",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95332",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61210",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85719",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95332",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61210",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85719"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Parser.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3793": {
      "id": "CVE-2013-3793",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95323",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61264",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85710",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95323",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61264",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85710"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Data Manipulation Language.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3794": {
      "id": "CVE-2013-3794",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95333",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61222",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95333",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61222"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3801": {
      "id": "CVE-2013-3801",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95331",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61269",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95331",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61269"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3802": {
      "id": "CVE-2013-3802",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95325",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61244",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85712",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95325",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.securityfocus.com/bid/61244",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85712"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Full Text Search.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3804": {
      "id": "CVE-2013-3804",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95328",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85715",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95328",
        "http://secunia.com/advisories/53372",
        "http://secunia.com/advisories/54300",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85715"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3805": {
      "id": "CVE-2013-3805",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95327",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95327",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.30 and earlier and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Prepared Statements.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3808": {
      "id": "CVE-2013-3808",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95330",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85717",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95330",
        "http://secunia.com/advisories/53372",
        "http://security.gentoo.org/glsa/glsa-201308-06.xml",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85717"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier, and 5.6.10 allows remote authenticated users to affect availability via unknown vectors related to Server Options.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3809": {
      "id": "CVE-2013-3809",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95322",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85709",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95322",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85709"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Audit Log.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3812": {
      "id": "CVE-2013-3812",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95336",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85723",
        "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
        "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
        "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
        "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
        "http://osvdb.org/95336",
        "http://secunia.com/advisories/54300",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
        "http://www.ubuntu.com/usn/USN-1909-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/85723"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-3839": {
      "id": "CVE-2013-3839",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/55291",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63109",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/55291",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2780",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2013:250",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63109",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.70 and earlier, 5.5.32 and earlier, and 5.6.12 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-5807": {
      "id": "CVE-2013-5807",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63105",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.debian.org/security/2013/dsa-2818",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
        "http://www.securityfocus.com/bid/63105",
        "http://www.securitytracker.com/id/1029184",
        "http://www.ubuntu.com/usn/USN-2006-1"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.x through 5.5.32 and 5.6.x through 5.6.12 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-5891": {
      "id": "CVE-2013-5891",
      "references": [
        "http://osvdb.org/102070",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64891",
        "http://osvdb.org/102070",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64891"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.33 and earlier and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2013-5908": {
      "id": "CVE-2013-5908",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://osvdb.org/102078",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64896",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90389",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://osvdb.org/102078",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64896",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90389"
      ],
      "score": 2.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote attackers to affect availability via unknown vectors related to Error Handling.",
      "vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0001": {
      "id": "CVE-2014-0001",
      "references": [
        "http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
        "http://osvdb.org/102713",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/52161",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
        "http://www.osvdb.org/102714",
        "http://www.securityfocus.com/bid/65298",
        "http://www.securitytracker.com/id/1029708",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
        "https://mariadb.com/kb/en/mariadb-5535-changelog/",
        "http://bazaar.launchpad.net/~maria-captains/maria/5.5/revision/2502.565.64",
        "http://osvdb.org/102713",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/52161",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2014:029",
        "http://www.osvdb.org/102714",
        "http://www.securityfocus.com/bid/65298",
        "http://www.securitytracker.com/id/1029708",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1054592",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90901",
        "https://mariadb.com/kb/en/mariadb-5535-changelog/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2014-0060": {
      "id": "CVE-2014-0060",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://secunia.com/advisories/61307",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://puppet.com/security/cve/cve-2014-0060",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 4,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
      "weakness": "CWE-264"
    },
    "CVE-2014-0061": {
      "id": "CVE-2014-0061",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://secunia.com/advisories/61307",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 6.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-264"
    },
    "CVE-2014-0062": {
      "id": "CVE-2014-0062",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://secunia.com/advisories/61307",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.securityfocus.com/bid/65727",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 4.9,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
      "weakness": "CWE-362"
    },
    "CVE-2014-0063": {
      "id": "CVE-2014-0063",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://secunia.com/advisories/61307",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.postgresql.org/support/security/",
        "http://www.securityfocus.com/bid/65719",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1065226",
        "https://github.com/postgres/postgres/commit/4318daecc959886d001a6e79c6ea853e8b1dfb4b",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 6.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2014-0064": {
      "id": "CVE-2014-0064",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://secunia.com/advisories/61307",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.postgresql.org/support/security/",
        "http://www.securityfocus.com/bid/65725",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1065230",
        "https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 6.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-189"
    },
    "CVE-2014-0065": {
      "id": "CVE-2014-0065",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.securityfocus.com/bid/65731",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 6.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-119"
    },
    "CVE-2014-0066": {
      "id": "CVE-2014-0066",
      "references": [
        "http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0211.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0249.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://support.apple.com/kb/HT6448",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.ubuntu.com/usn/USN-2120-1",
        "https://support.apple.com/kb/HT6536"
      ],
      "score": 4,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "CWE-20"
    },
    "CVE-2014-0067": {
      "id": "CVE-2014-0067",
      "references": [
        "http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html",
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00018.html",
        "http://lists.opensuse.org/opensuse-updates/2014-03/msg00038.html",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.securityfocus.com/bid/65721",
        "https://support.apple.com/HT205219",
        "https://support.apple.com/kb/HT205031"
      ],
      "score": 4.6,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "The \"make check\" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "CWE-264"
    },
    "CVE-2014-0384": {
      "id": "CVE-2014-0384",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to XML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0386": {
      "id": "CVE-2014-0386",
      "references": [
        "http://osvdb.org/102069",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64904",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90380",
        "http://osvdb.org/102069",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64904",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90380"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0393": {
      "id": "CVE-2014-0393",
      "references": [
        "http://osvdb.org/102075",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64877",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90386",
        "http://osvdb.org/102075",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64877",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90386"
      ],
      "score": 3.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect integrity via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0401": {
      "id": "CVE-2014-0401",
      "references": [
        "http://osvdb.org/102071",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64898",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90382",
        "http://osvdb.org/102071",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64898",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90382"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0402": {
      "id": "CVE-2014-0402",
      "references": [
        "http://osvdb.org/102068",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64908",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90379",
        "http://osvdb.org/102068",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64908",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90379"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13 and earlier allows remote authenticated users to affect availability via unknown vectors related to Locking.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0412": {
      "id": "CVE-2014-0412",
      "references": [
        "http://osvdb.org/102067",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64880",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90378",
        "http://osvdb.org/102067",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64880",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90378"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0420": {
      "id": "CVE-2014-0420",
      "references": [
        "http://osvdb.org/102077",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64888",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90388",
        "http://osvdb.org/102077",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64888",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90388"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-0437": {
      "id": "CVE-2014-0437",
      "references": [
        "http://osvdb.org/102074",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64849",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90385",
        "http://osvdb.org/102074",
        "http://rhn.redhat.com/errata/RHSA-2014-0164.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0173.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0186.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0189.html",
        "http://secunia.com/advisories/56491",
        "http://secunia.com/advisories/56541",
        "http://secunia.com/advisories/56580",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://ubuntu.com/usn/usn-2086-1",
        "http://www.debian.org/security/2014/dsa-2845",
        "http://www.debian.org/security/2014/dsa-2848",
        "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
        "http://www.securityfocus.com/bid/64758",
        "http://www.securityfocus.com/bid/64849",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/90385"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2419": {
      "id": "CVE-2014-2419",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66880",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66880"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Partition.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2430": {
      "id": "CVE-2014-2430",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66858",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66858"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2431": {
      "id": "CVE-2014-2431",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66890",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66890"
      ],
      "score": 2.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect availability via unknown vectors related to Options.",
      "vector_string": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2432": {
      "id": "CVE-2014-2432",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66875",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66875"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability Oracle the MySQL Server component 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Federated.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2436": {
      "id": "CVE-2014-2436",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66896",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66896"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to RBR.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2438": {
      "id": "CVE-2014-2438",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66846",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66846"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via unknown vectors related to Replication.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2440": {
      "id": "CVE-2014-2440",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66850",
        "http://rhn.redhat.com/errata/RHSA-2014-0522.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0536.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0537.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0702.html",
        "http://security.gentoo.org/glsa/glsa-201409-04.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2014-1972952.html",
        "http://www.securityfocus.com/bid/66850"
      ],
      "score": 5.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Client component in Oracle MySQL 5.5.36 and earlier and 5.6.16 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.",
      "vector_string": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2494": {
      "id": "CVE-2014-2494",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-2669": {
      "id": "CVE-2014-2669",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2014-0221.html",
        "http://rhn.redhat.com/errata/RHSA-2014-0469.html",
        "http://wiki.postgresql.org/wiki/20140220securityrelease",
        "http://www.debian.org/security/2014/dsa-2864",
        "http://www.debian.org/security/2014/dsa-2865",
        "http://www.postgresql.org/about/news/1506/",
        "http://www.postgresql.org/support/security/",
        "https://github.com/postgres/postgres/commit/31400a673325147e1205326008e32135a78b4d8a"
      ],
      "score": 6.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "Multiple integer overflows in contrib/hstore/hstore_io.c in PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact via vectors related to the (1) hstore_recv, (2) hstore_from_arrays, and (3) hstore_from_array functions in contrib/hstore/hstore_io.c; and the (4) hstoreArrayToPairs function in contrib/hstore/hstore_op.c, which triggers a buffer overflow.  NOTE: this issue was SPLIT from CVE-2014-0064 because it has a different set of affected versions.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "CWE-189"
    },
    "CVE-2014-4207": {
      "id": "CVE-2014-4207",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68593",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94624",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68593",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94624"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to SROPTZR.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4243": {
      "id": "CVE-2014-4243",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68611",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94628",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68611",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94628"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4258": {
      "id": "CVE-2014-4258",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68564",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94620",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68564",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94620"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4260": {
      "id": "CVE-2014-4260",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68573",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94621",
        "http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://seclists.org/fulldisclosure/2014/Dec/23",
        "http://secunia.com/advisories/60425",
        "http://www.debian.org/security/2014/dsa-2985",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
        "http://www.securityfocus.com/archive/1/534161/100/0/threaded",
        "http://www.securityfocus.com/bid/68573",
        "http://www.securitytracker.com/id/1030578",
        "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/94621"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier, and 5.6.17 and earlier, allows remote authenticated users to affect integrity and availability via vectors related to SRCHAR.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4274": {
      "id": "CVE-2014-4274",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/69732",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/69732"
      ],
      "score": 4.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.",
      "vector_string": "AV:L/AC:M/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-4287": {
      "id": "CVE-2014-4287",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70517",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70517"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:CHARACTER SETS.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6463": {
      "id": "CVE-2014-6463",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70532",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70532"
      ],
      "score": 3.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.",
      "vector_string": "AV:N/AC:L/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6464": {
      "id": "CVE-2014-6464",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70451",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70451"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6469": {
      "id": "CVE-2014-6469",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70446",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70446"
      ],
      "score": 6.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6478": {
      "id": "CVE-2014-6478",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70489",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70489"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect integrity via vectors related to SERVER:SSL:yaSSL.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6484": {
      "id": "CVE-2014-6484",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70455",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70455"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6491": {
      "id": "CVE-2014-6491",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70444",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70444"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6494": {
      "id": "CVE-2014-6494",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70497",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70497"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6495": {
      "id": "CVE-2014-6495",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70496",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70496"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote attackers to affect availability via vectors related to SERVER:SSL:yaSSL.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6496": {
      "id": "CVE-2014-6496",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70469",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70469"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6500": {
      "id": "CVE-2014-6500",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70478",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70478"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6505": {
      "id": "CVE-2014-6505",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70516",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70516"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to SERVER:MEMORY STORAGE ENGINE.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6507": {
      "id": "CVE-2014-6507",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70550",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70550"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6520": {
      "id": "CVE-2014-6520",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70510",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70510"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6530": {
      "id": "CVE-2014-6530",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70486",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70486"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to CLIENT:MYSQLDUMP.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6551": {
      "id": "CVE-2014-6551",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70462",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70462"
      ],
      "score": 2.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality via vectors related to CLIENT:MYSQLADMIN.",
      "vector_string": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6555": {
      "id": "CVE-2014-6555",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70530",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70530"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6559": {
      "id": "CVE-2014-6559",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70487",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://secunia.com/advisories/61579",
        "http://secunia.com/advisories/62073",
        "http://security.gentoo.org/glsa/glsa-201411-02.xml",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html",
        "http://www.securityfocus.com/bid/70487"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2014-6568": {
      "id": "CVE-2014-6568",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72210",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72210",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0374": {
      "id": "CVE-2015-0374",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72227",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72227",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100191",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.",
      "vector_string": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0381": {
      "id": "CVE-2015-0381",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72214",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72214",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100185",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0382": {
      "id": "CVE-2015-0382",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72200",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72200",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100184",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0391": {
      "id": "CVE-2015-0391",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72205",
        "http://www.securitytracker.com/id/1031581",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72205",
        "http://www.securitytracker.com/id/1031581",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100186",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier, and 5.6.19 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0411": {
      "id": "CVE-2015-0411",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72191",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72191",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100183",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0432": {
      "id": "CVE-2015-0432",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72217",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
        "https://security.gentoo.org/glsa/201504-05",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0116.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0117.html",
        "http://rhn.redhat.com/errata/RHSA-2015-0118.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://secunia.com/advisories/62728",
        "http://secunia.com/advisories/62730",
        "http://secunia.com/advisories/62732",
        "http://www.debian.org/security/2015/dsa-3135",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
        "http://www.securityfocus.com/bid/72217",
        "http://www.securitytracker.com/id/1031581",
        "http://www.ubuntu.com/usn/USN-2480-1",
        "https://exchange.xforce.ibmcloud.com/vulnerabilities/100187",
        "https://security.gentoo.org/glsa/201504-05"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0433": {
      "id": "CVE-2015-0433",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0441": {
      "id": "CVE-2015-0441",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0499": {
      "id": "CVE-2015-0499",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0501": {
      "id": "CVE-2015-0501",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 5.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-0505": {
      "id": "CVE-2015-0505",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74112",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74112",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2325": {
      "id": "CVE-2015-2325",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
        "https://bugs.exim.org/show_bug.cgi?id=1591",
        "https://fortiguard.com/zeroday/FG-VD-15-015",
        "https://www.pcre.org/original/changelog.txt",
        "http://lists.opensuse.org/opensuse-updates/2015-05/msg00014.html",
        "https://bugs.exim.org/show_bug.cgi?id=1591",
        "https://fortiguard.com/zeroday/FG-VD-15-015",
        "https://www.pcre.org/original/changelog.txt"
      ],
      "score": 7.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-125"
    },
    "CVE-2015-2568": {
      "id": "CVE-2015-2568",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74073",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74073",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2571": {
      "id": "CVE-2015-2571",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74095",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.mandriva.com/security/advisories?name=MDVSA-2015:227",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74095",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2573": {
      "id": "CVE-2015-2573",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74078",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19",
        "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3229",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
        "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html",
        "http://www.securityfocus.com/bid/74078",
        "http://www.securitytracker.com/id/1032121",
        "http://www.ubuntu.com/usn/USN-2575-1",
        "https://security.gentoo.org/glsa/201507-19"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2582": {
      "id": "CVE-2015-2582",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75751",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75751",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2620": {
      "id": "CVE-2015-2620",
      "references": [
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75837",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75837",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2643": {
      "id": "CVE-2015-2643",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75830",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75830",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-2648": {
      "id": "CVE-2015-2648",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75822",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75822",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-3152": {
      "id": "CVE-2015-3152",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
        "http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
        "http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
        "http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.ocert.org/advisories/ocert-2015-003.html",
        "http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
        "http://www.securityfocus.com/bid/74398",
        "http://www.securitytracker.com/id/1032216",
        "https://access.redhat.com/security/cve/cve-2015-3152",
        "https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
        "https://jira.mariadb.org/browse/MDEV-7937",
        "https://www.duosecurity.com/blog/backronym-mysql-vulnerability",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161436.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161625.html",
        "http://mysqlblog.fivefarmers.com/2014/04/02/redefining-ssl-option/",
        "http://mysqlblog.fivefarmers.com/2015/04/29/ssltls-in-5-6-and-5-5-ocert-advisory/",
        "http://packetstormsecurity.com/files/131688/MySQL-SSL-TLS-Downgrade.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.ocert.org/advisories/ocert-2015-003.html",
        "http://www.securityfocus.com/archive/1/535397/100/1100/threaded",
        "http://www.securityfocus.com/bid/74398",
        "http://www.securitytracker.com/id/1032216",
        "https://access.redhat.com/security/cve/cve-2015-3152",
        "https://github.com/mysql/mysql-server/commit/3bd5589e1a5a93f9c224badf983cd65c45215390",
        "https://jira.mariadb.org/browse/MDEV-7937",
        "https://www.duosecurity.com/blog/backronym-mysql-vulnerability"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a \"BACKRONYM\" attack.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-295"
    },
    "CVE-2015-3165": {
      "id": "CVE-2015-3165",
      "references": [
        "http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1194.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1195.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1196.html",
        "http://www.debian.org/security/2015/dsa-3269",
        "http://www.debian.org/security/2015/dsa-3270",
        "http://www.postgresql.org/about/news/1587/",
        "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html",
        "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html",
        "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
        "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
        "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html",
        "http://www.securityfocus.com/bid/74787",
        "http://www.ubuntu.com/usn/USN-2621-1",
        "https://security.gentoo.org/glsa/201507-20",
        "https://support.apple.com/HT205219"
      ],
      "score": 4.3,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.",
      "vector_string": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2015-3166": {
      "id": "CVE-2015-3166",
      "references": [
        "http://ubuntu.com/usn/usn-2621-1",
        "http://www.debian.org/security/2015/dsa-3269",
        "http://www.debian.org/security/2015/dsa-3270",
        "http://www.postgresql.org/about/news/1587/",
        "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html",
        "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html",
        "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
        "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
        "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html"
      ],
      "score": 9.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "critical",
      "summary": "The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as demonstrated by an out-of-memory error.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-119"
    },
    "CVE-2015-3167": {
      "id": "CVE-2015-3167",
      "references": [
        "http://ubuntu.com/usn/usn-2621-1",
        "http://www.debian.org/security/2015/dsa-3269",
        "http://www.debian.org/security/2015/dsa-3270",
        "http://www.postgresql.org/about/news/1587/",
        "http://www.postgresql.org/docs/9.0/static/release-9-0-20.html",
        "http://www.postgresql.org/docs/9.1/static/release-9-1-16.html",
        "http://www.postgresql.org/docs/9.2/static/release-9-2-11.html",
        "http://www.postgresql.org/docs/9.3/static/release-9-3-7.html",
        "http://www.postgresql.org/docs/9.4/static/release-9-4-2.html"
      ],
      "score": 7.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "contrib/pgcrypto in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 uses different error responses when an incorrect key is used, which makes it easier for attackers to obtain the key via a brute force attack.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2015-4752": {
      "id": "CVE-2015-4752",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75849",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3308",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75849",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4757": {
      "id": "CVE-2015-4757",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75759",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06",
        "http://lists.opensuse.org/opensuse-updates/2015-09/msg00042.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1629.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1630.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1646.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1647.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.debian.org/security/2015/dsa-3311",
        "http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html",
        "http://www.securityfocus.com/bid/75759",
        "http://www.securitytracker.com/id/1032911",
        "http://www.ubuntu.com/usn/USN-2674-1",
        "https://security.gentoo.org/glsa/201610-06"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4792": {
      "id": "CVE-2015-4792",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77171",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77171",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 1.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.",
      "vector_string": "AV:N/AC:H/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4802": {
      "id": "CVE-2015-4802",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77165",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77165",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4807": {
      "id": "CVE-2015-4807",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77205",
        "http://www.securitytracker.com/id/1033894",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77205",
        "http://www.securitytracker.com/id/1033894",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4815": {
      "id": "CVE-2015-4815",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77222",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77222",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4816": {
      "id": "CVE-2015-4816",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77134",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77134",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4819": {
      "id": "CVE-2015-4819",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77196",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77196",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 7.2,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.",
      "vector_string": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4826": {
      "id": "CVE-2015-4826",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77237",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77237",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.",
      "vector_string": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4830": {
      "id": "CVE-2015-4830",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77228",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77228",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4836": {
      "id": "CVE-2015-4836",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77190",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77190",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 2.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.",
      "vector_string": "AV:N/AC:M/Au:M/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4858": {
      "id": "CVE-2015-4858",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77145",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77145",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4861": {
      "id": "CVE-2015-4861",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77137",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77137",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4864": {
      "id": "CVE-2015-4864",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77187",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1665.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.securityfocus.com/bid/77187",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4870": {
      "id": "CVE-2015-4870",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77208",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.exploit-db.com/exploits/39867/",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://packetstormsecurity.com/files/137232/MySQL-Procedure-Analyse-Denial-Of-Service.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77208",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.exploit-db.com/exploits/39867/",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4879": {
      "id": "CVE-2015-4879",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77140",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://rhn.redhat.com/errata/RHSA-2015-1628.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77140",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 4.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.",
      "vector_string": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-4913": {
      "id": "CVE-2015-4913",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77153",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00010.html",
        "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00011.html",
        "http://lists.opensuse.org/opensuse-updates/2016-02/msg00039.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2015/dsa-3377",
        "http://www.debian.org/security/2015/dsa-3385",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/77153",
        "http://www.securitytracker.com/id/1033894",
        "http://www.ubuntu.com/usn/USN-2781-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://www.suse.com/support/update/announcement/2016/suse-su-20160296-1.html"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2015-5288": {
      "id": "CVE-2015-5288",
      "references": [
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html",
        "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html",
        "http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html",
        "http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html",
        "http://www.debian.org/security/2015/dsa-3374",
        "http://www.debian.org/security/2016/dsa-3475",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
        "http://www.postgresql.org/about/news/1615/",
        "http://www.postgresql.org/docs/9.0/static/release-9-0-23.html",
        "http://www.postgresql.org/docs/9.1/static/release-9-1-19.html",
        "http://www.postgresql.org/docs/9.2/static/release-9-2-14.html",
        "http://www.postgresql.org/docs/9.3/static/release-9-3-10.html",
        "http://www.postgresql.org/docs/9.4/static/release-9-4-5.html",
        "http://www.securityfocus.com/bid/77049",
        "http://www.securitytracker.com/id/1033775",
        "http://www.ubuntu.com/usn/USN-2772-1",
        "https://security.gentoo.org/glsa/201701-33"
      ],
      "score": 6.4,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a \"too-short\" salt.",
      "vector_string": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
      "weakness": "CWE-200"
    },
    "CVE-2015-7744": {
      "id": "CVE-2015-7744",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708",
        "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
        "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708",
        "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf",
        "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0502": {
      "id": "CVE-2016-0502",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securitytracker.com/id/1034708"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0610": {
      "id": "CVE-2016-0610",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securityfocus.com/bid/81198",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.securityfocus.com/bid/81198",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/"
      ],
      "score": 3.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.",
      "vector_string": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0616": {
      "id": "CVE-2016-0616",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3453",
        "http://www.debian.org/security/2016/dsa-3459",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/81176",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
        "https://mariadb.com/kb/en/mdb-10023-rn/",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3453",
        "http://www.debian.org/security/2016/dsa-3459",
        "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html",
        "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html",
        "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html",
        "http://www.securityfocus.com/bid/81176",
        "http://www.securitytracker.com/id/1034708",
        "http://www.ubuntu.com/usn/USN-2881-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/",
        "https://mariadb.com/kb/en/mdb-10023-rn/"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.",
      "vector_string": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0642": {
      "id": "CVE-2016-0642",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3557",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securityfocus.com/bid/86445",
        "http://www.securitytracker.com/id/1035606",
        "http://www.ubuntu.com/usn/USN-2953-1",
        "http://www.ubuntu.com/usn/USN-2954-1",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00053.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.debian.org/security/2016/dsa-3557",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securityfocus.com/bid/86445",
        "http://www.securitytracker.com/id/1035606",
        "http://www.ubuntu.com/usn/USN-2953-1",
        "http://www.ubuntu.com/usn/USN-2954-1",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 4.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0651": {
      "id": "CVE-2016-0651",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securitytracker.com/id/1035606",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00035.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html",
        "http://www.securitytracker.com/id/1035606",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-0766": {
      "id": "CVE-2016-0766",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html",
        "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html",
        "http://www.debian.org/security/2016/dsa-3475",
        "http://www.debian.org/security/2016/dsa-3476",
        "http://www.postgresql.org/about/news/1644/",
        "http://www.postgresql.org/docs/current/static/release-9-1-20.html",
        "http://www.postgresql.org/docs/current/static/release-9-2-15.html",
        "http://www.postgresql.org/docs/current/static/release-9-3-11.html",
        "http://www.postgresql.org/docs/current/static/release-9-4-6.html",
        "http://www.postgresql.org/docs/current/static/release-9-5-1.html",
        "http://www.securityfocus.com/bid/83184",
        "http://www.securitytracker.com/id/1035005",
        "http://www.ubuntu.com/usn/USN-2894-1",
        "https://security.gentoo.org/glsa/201701-33"
      ],
      "score": 8.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-264"
    },
    "CVE-2016-3471": {
      "id": "CVE-2016-3471",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securityfocus.com/bid/91913",
        "http://www.securitytracker.com/id/1036362",
        "https://access.redhat.com/errata/RHSA-2016:1132",
        "http://rhn.redhat.com/errata/RHSA-2016-0534.html",
        "http://rhn.redhat.com/errata/RHSA-2016-0705.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1480.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1481.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html",
        "http://www.securityfocus.com/bid/91787",
        "http://www.securityfocus.com/bid/91913",
        "http://www.securitytracker.com/id/1036362",
        "https://access.redhat.com/errata/RHSA-2016:1132"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.45 and earlier and 5.6.26 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Option.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-3492": {
      "id": "CVE-2016-3492",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93650",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93650",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5423": {
      "id": "CVE-2016-5423",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-1781.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1820.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1821.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2606.html",
        "http://www.debian.org/security/2016/dsa-3646",
        "http://www.securityfocus.com/bid/92433",
        "http://www.securitytracker.com/id/1036617",
        "https://access.redhat.com/errata/RHSA-2017:2425",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1364001",
        "https://security.gentoo.org/glsa/201701-33",
        "https://www.postgresql.org/about/news/1688/",
        "https://www.postgresql.org/docs/current/static/release-9-1-23.html",
        "https://www.postgresql.org/docs/current/static/release-9-2-18.html",
        "https://www.postgresql.org/docs/current/static/release-9-3-14.html",
        "https://www.postgresql.org/docs/current/static/release-9-4-9.html",
        "https://www.postgresql.org/docs/current/static/release-9-5-4.html"
      ],
      "score": 8.3,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
      "weakness": "CWE-476"
    },
    "CVE-2016-5424": {
      "id": "CVE-2016-5424",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-1781.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1820.html",
        "http://rhn.redhat.com/errata/RHSA-2016-1821.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2606.html",
        "http://www.debian.org/security/2016/dsa-3646",
        "http://www.securityfocus.com/bid/92435",
        "http://www.securitytracker.com/id/1036617",
        "https://access.redhat.com/errata/RHSA-2017:2425",
        "https://security.gentoo.org/glsa/201701-33",
        "https://www.postgresql.org/about/news/1688/",
        "https://www.postgresql.org/docs/current/static/release-9-1-23.html",
        "https://www.postgresql.org/docs/current/static/release-9-2-18.html",
        "https://www.postgresql.org/docs/current/static/release-9-3-14.html",
        "https://www.postgresql.org/docs/current/static/release-9-4-9.html",
        "https://www.postgresql.org/docs/current/static/release-9-5-4.html"
      ],
      "score": 7.1,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) \" (double quote), (2) \\ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "CWE-94"
    },
    "CVE-2016-5584": {
      "id": "CVE-2016-5584",
      "references": [
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93735",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93735",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5612": {
      "id": "CVE-2016-5612",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-1601.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93630",
        "http://www.securitytracker.com/id/1037050",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-1601.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93630",
        "http://www.securitytracker.com/id/1037050",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5624": {
      "id": "CVE-2016-5624",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93635",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93635",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier allows remote authenticated users to affect availability via vectors related to DML.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5626": {
      "id": "CVE-2016-5626",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93638",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93638",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-5629": {
      "id": "CVE-2016-5629",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93668",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2131.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2595.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93668",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-10118-release-notes/",
        "https://mariadb.com/kb/en/mariadb/mariadb-5552-release-notes/",
        "https://security.gentoo.org/glsa/201701-01"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-6664": {
      "id": "CVE-2016-6664",
      "references": [
        "http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
        "http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://seclists.org/fulldisclosure/2016/Nov/4",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/archive/1/539695/100/0/threaded",
        "http://www.securityfocus.com/bid/93612",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-18",
        "https://www.exploit-db.com/exploits/40679/",
        "https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/",
        "http://legalhackers.com/advisories/MySQL-Maria-Percona-RootPrivEsc-CVE-2016-6664-5617-Exploit.html",
        "http://packetstormsecurity.com/files/139491/MySQL-MariaDB-PerconaDB-Root-Privilege-Escalation.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2130.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2749.html",
        "http://seclists.org/fulldisclosure/2016/Nov/4",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/archive/1/539695/100/0/threaded",
        "http://www.securityfocus.com/bid/93612",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-18",
        "https://www.exploit-db.com/exploits/40679/",
        "https://www.percona.com/blog/2016/11/02/percona-responds-to-cve-2016-6663-and-cve-2016-6664/"
      ],
      "score": 7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB; Percona Server before 5.5.51-38.2, 5.6.x before 5.6.32-78-1, and 5.7.x before 5.7.14-8; and Percona XtraDB Cluster before 5.5.41-37.0, 5.6.x before 5.6.32-25.17, and 5.7.x before 5.7.14-26.17, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2016-7048": {
      "id": "CVE-2016-7048",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1378043",
        "https://www.postgresql.org/support/security/"
      ],
      "score": 8.1,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "The interactive installer in PostgreSQL before 9.3.15, 9.4.x before 9.4.10, and 9.5.x before 9.5.5 might allow remote attackers to execute arbitrary code by leveraging use of HTTP to download software.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-284"
    },
    "CVE-2016-7440": {
      "id": "CVE-2016-7440",
      "references": [
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93659",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html",
        "http://www.debian.org/security/2016/dsa-3706",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
        "http://www.securityfocus.com/bid/93659",
        "http://www.securitytracker.com/id/1037050",
        "https://mariadb.com/kb/en/mariadb/mariadb-10028-release-notes/",
        "https://wolfssl.com/wolfSSL/Blog/Entries/2016/9/26_wolfSSL_3.9.10_Vulnerability_Fixes.html"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2016-9843": {
      "id": "CVE-2016-9843",
      "references": [
        "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
        "http://www.openwall.com/lists/oss-security/2016/12/05/21",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/95131",
        "http://www.securitytracker.com/id/1039427",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2017:1220",
        "https://access.redhat.com/errata/RHSA-2017:1221",
        "https://access.redhat.com/errata/RHSA-2017:1222",
        "https://access.redhat.com/errata/RHSA-2017:2999",
        "https://access.redhat.com/errata/RHSA-2017:3046",
        "https://access.redhat.com/errata/RHSA-2017:3047",
        "https://access.redhat.com/errata/RHSA-2017:3453",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
        "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
        "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
        "https://security.gentoo.org/glsa/201701-56",
        "https://security.gentoo.org/glsa/202007-54",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://support.apple.com/HT208112",
        "https://support.apple.com/HT208113",
        "https://support.apple.com/HT208115",
        "https://support.apple.com/HT208144",
        "https://usn.ubuntu.com/4246-1/",
        "https://usn.ubuntu.com/4292-1/",
        "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
        "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html",
        "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html",
        "http://www.openwall.com/lists/oss-security/2016/12/05/21",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/95131",
        "http://www.securitytracker.com/id/1039427",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2017:1220",
        "https://access.redhat.com/errata/RHSA-2017:1221",
        "https://access.redhat.com/errata/RHSA-2017:1222",
        "https://access.redhat.com/errata/RHSA-2017:2999",
        "https://access.redhat.com/errata/RHSA-2017:3046",
        "https://access.redhat.com/errata/RHSA-2017:3047",
        "https://access.redhat.com/errata/RHSA-2017:3453",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1402351",
        "https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811",
        "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html",
        "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html",
        "https://security.gentoo.org/glsa/201701-56",
        "https://security.gentoo.org/glsa/202007-54",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://support.apple.com/HT208112",
        "https://support.apple.com/HT208113",
        "https://support.apple.com/HT208115",
        "https://support.apple.com/HT208144",
        "https://usn.ubuntu.com/4246-1/",
        "https://usn.ubuntu.com/4292-1/",
        "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib",
        "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 9.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "critical",
      "summary": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-10268": {
      "id": "CVE-2017-10268",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101390",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101390",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-10378": {
      "id": "CVE-2017-10378",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101375",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101375",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.11 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-10379": {
      "id": "CVE-2017-10379",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101415",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101415",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.57 and earlier, 5.6.37 and earlier and 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-863"
    },
    "CVE-2017-10384": {
      "id": "CVE-2017-10384",
      "references": [
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101406",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/",
        "http://www.debian.org/security/2017/dsa-4002",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
        "http://www.securityfocus.com/bid/101406",
        "http://www.securitytracker.com/id/1039597",
        "https://access.redhat.com/errata/RHSA-2017:3265",
        "https://access.redhat.com/errata/RHSA-2017:3442",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://security.netapp.com/advisory/ntap-20171019-0002/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.57 and earlier 5.6.37 and earlier 5.7.19 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-12172": {
      "id": "CVE-2017-12172",
      "references": [
        "http://www.securityfocus.com/bid/101949",
        "http://www.securitytracker.com/id/1039752",
        "https://access.redhat.com/errata/RHSA-2017:3402",
        "https://access.redhat.com/errata/RHSA-2017:3403",
        "https://access.redhat.com/errata/RHSA-2017:3404",
        "https://access.redhat.com/errata/RHSA-2017:3405",
        "https://www.postgresql.org/about/news/1801/",
        "https://www.postgresql.org/support/security/"
      ],
      "score": 6.7,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.",
      "vector_string": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-59"
    },
    "CVE-2017-14798": {
      "id": "CVE-2017-14798",
      "references": [
        "http://lists.suse.com/pipermail/sle-security-updates/2017-November/003420.html",
        "https://bugzilla.suse.com/show_bug.cgi?id=1062722",
        "https://www.exploit-db.com/exploits/45184/",
        "https://www.suse.com/de-de/security/cve/CVE-2017-14798/"
      ],
      "score": 7,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "A race condition in the postgresql init script could be used by attackers able to access the postgresql account to escalate their privileges to root.",
      "vector_string": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-362"
    },
    "CVE-2017-15098": {
      "id": "CVE-2017-15098",
      "references": [
        "http://www.securityfocus.com/bid/101781",
        "http://www.securitytracker.com/id/1039752",
        "https://access.redhat.com/errata/RHSA-2018:2511",
        "https://access.redhat.com/errata/RHSA-2018:2566",
        "https://www.debian.org/security/2017/dsa-4027",
        "https://www.debian.org/security/2017/dsa-4028",
        "https://www.postgresql.org/about/news/1801/",
        "https://www.postgresql.org/support/security/"
      ],
      "score": 8.1,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
      "weakness": "CWE-200"
    },
    "CVE-2017-15365": {
      "id": "CVE-2017-15365",
      "references": [
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
        "https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
        "https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
        "https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
        "https://www.debian.org/security/2018/dsa-4341",
        "https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
        "https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1524234",
        "https://github.com/MariaDB/server/commit/0b5a5258abbeaf8a0c3a18c7e753699787fdf46e",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELCZV46WIYSJ6VMC65GMNN3A3QDRUJGK/",
        "https://mariadb.com/kb/en/library/mariadb-10130-release-notes/",
        "https://mariadb.com/kb/en/library/mariadb-10210-release-notes/",
        "https://www.debian.org/security/2018/dsa-4341",
        "https://www.percona.com/blog/2017/10/30/percona-xtradb-cluster-5-6-37-26-21-3-is-now-available/",
        "https://www.percona.com/doc/percona-xtradb-cluster/LATEST/release-notes/Percona-XtraDB-Cluster-5.7.19-29.22-3.html"
      ],
      "score": 8.8,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3238": {
      "id": "CVE-2017-3238",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95571",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95571",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3243": {
      "id": "CVE-2017-3243",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95538",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95538",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Charsets). Supported versions that are affected are 5.5.53 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.4 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3244": {
      "id": "CVE-2017-3244",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95565",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95565",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3258": {
      "id": "CVE-2017-3258",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95560",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95560",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 6.5 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-20"
    },
    "CVE-2017-3265": {
      "id": "CVE-2017-3265",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95520",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95520",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 5.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 5.6 (Confidentiality and Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3291": {
      "id": "CVE-2017-3291",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95501",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95501",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.3 (Confidentiality, Integrity and Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3302": {
      "id": "CVE-2017-3302",
      "references": [
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.openwall.com/lists/oss-security/2017/02/11/11",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/96162",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.openwall.com/lists/oss-security/2017/02/11/11",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/96162",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Crash in libmysqlclient.so in Oracle MySQL before 5.6.21 and 5.7.x before 5.7.5 and MariaDB through 5.5.54, 10.0.x through 10.0.29, 10.1.x through 10.1.21, and 10.2.x through 10.2.3.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2017-3308": {
      "id": "CVE-2017-3308",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97725",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97725",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 7.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3309": {
      "id": "CVE-2017-3309",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97742",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97742",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 7.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 7.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3312": {
      "id": "CVE-2017-3312",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95491",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95491",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 6.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS v3.0 Base Score 6.7 (Confidentiality, Integrity and Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3313": {
      "id": "CVE-2017-3313",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95527",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3809",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95527",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17"
      ],
      "score": 4.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: MyISAM). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.7 (Confidentiality impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3317": {
      "id": "CVE-2017-3317",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95585",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95585",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Logging). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS v3.0 Base Score 4.0 (Availability impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3318": {
      "id": "CVE-2017-3318",
      "references": [
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95588",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18",
        "http://www.debian.org/security/2017/dsa-3767",
        "http://www.debian.org/security/2017/dsa-3770",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html",
        "http://www.securityfocus.com/bid/95588",
        "http://www.securitytracker.com/id/1037640",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://security.gentoo.org/glsa/201702-17",
        "https://security.gentoo.org/glsa/201702-18"
      ],
      "score": 4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Error Handling). Supported versions that are affected are 5.5.53 and earlier, 5.6.34 and earlier and 5.7.16 and earlier. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data. CVSS v3.0 Base Score 4.0 (Confidentiality impacts).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3453": {
      "id": "CVE-2017-3453",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97776",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97776",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3456": {
      "id": "CVE-2017-3456",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97831",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97831",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3464": {
      "id": "CVE-2017-3464",
      "references": [
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97818",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97818",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Easily \"exploitable\" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3600": {
      "id": "CVE-2017-3600",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97765",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3834",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
        "http://www.securityfocus.com/bid/97765",
        "http://www.securitytracker.com/id/1038287",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886"
      ],
      "score": 6.6,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.54 and earlier, 5.6.35 and earlier and 5.7.17 and earlier. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. Note: CVE-2017-3600 is equivalent to CVE-2016-5483. CVSS 3.0 Base Score 6.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3636": {
      "id": "CVE-2017-3636",
      "references": [
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99736",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99736",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.56 and earlier and 5.6.36 and earlier. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3641": {
      "id": "CVE-2017-3641",
      "references": [
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99767",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99767",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3651": {
      "id": "CVE-2017-3651",
      "references": [
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99802",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "http://rhn.redhat.com/errata/RHSA-2016-2927.html",
        "http://rhn.redhat.com/errata/RHSA-2016-2928.html",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99802",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2192",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-3653": {
      "id": "CVE-2017-3653",
      "references": [
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99810",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955",
        "http://www.debian.org/security/2017/dsa-3922",
        "http://www.debian.org/security/2017/dsa-3944",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html",
        "http://www.securityfocus.com/bid/99810",
        "http://www.securitytracker.com/id/1038928",
        "https://access.redhat.com/errata/RHSA-2017:2787",
        "https://access.redhat.com/errata/RHSA-2017:2886",
        "https://access.redhat.com/errata/RHSA-2018:0279",
        "https://access.redhat.com/errata/RHSA-2018:0574",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://www.debian.org/security/2017/dsa-3955"
      ],
      "score": 3.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.56 and earlier, 5.6.36 and earlier and 5.7.18 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2017-7484": {
      "id": "CVE-2017-7484",
      "references": [
        "http://www.debian.org/security/2017/dsa-3851",
        "http://www.securityfocus.com/bid/98459",
        "http://www.securitytracker.com/id/1038476",
        "https://access.redhat.com/errata/RHSA-2017:1677",
        "https://access.redhat.com/errata/RHSA-2017:1678",
        "https://access.redhat.com/errata/RHSA-2017:1838",
        "https://access.redhat.com/errata/RHSA-2017:1983",
        "https://access.redhat.com/errata/RHSA-2017:2425",
        "https://security.gentoo.org/glsa/201710-06",
        "https://www.postgresql.org/about/news/1746/"
      ],
      "score": 7.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2017-7485": {
      "id": "CVE-2017-7485",
      "references": [
        "http://www.debian.org/security/2017/dsa-3851",
        "http://www.securityfocus.com/bid/98461",
        "http://www.securitytracker.com/id/1038476",
        "https://access.redhat.com/errata/RHSA-2017:1677",
        "https://access.redhat.com/errata/RHSA-2017:1678",
        "https://access.redhat.com/errata/RHSA-2017:1838",
        "https://access.redhat.com/errata/RHSA-2017:2425",
        "https://security.gentoo.org/glsa/201710-06",
        "https://www.postgresql.org/about/news/1746/"
      ],
      "score": 5.9,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "In PostgreSQL 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3, it was found that the PGREQUIRESSL environment variable was no longer enforcing a SSL/TLS connection to a PostgreSQL server. An active Man-in-the-Middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server.",
      "vector_string": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "weakness": "CWE-311"
    },
    "CVE-2017-7486": {
      "id": "CVE-2017-7486",
      "references": [
        "http://www.debian.org/security/2017/dsa-3851",
        "http://www.securityfocus.com/bid/98460",
        "http://www.securitytracker.com/id/1038476",
        "https://access.redhat.com/errata/RHSA-2017:1677",
        "https://access.redhat.com/errata/RHSA-2017:1678",
        "https://access.redhat.com/errata/RHSA-2017:1838",
        "https://access.redhat.com/errata/RHSA-2017:1983",
        "https://access.redhat.com/errata/RHSA-2017:2425",
        "https://security.gentoo.org/glsa/201710-06",
        "https://www.postgresql.org/about/news/1746/"
      ],
      "score": 7.5,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
      "weakness": "CWE-200"
    },
    "CVE-2017-7546": {
      "id": "CVE-2017-7546",
      "references": [
        "http://www.debian.org/security/2017/dsa-3935",
        "http://www.debian.org/security/2017/dsa-3936",
        "http://www.securityfocus.com/bid/100278",
        "http://www.securitytracker.com/id/1039142",
        "https://access.redhat.com/errata/RHSA-2017:2677",
        "https://access.redhat.com/errata/RHSA-2017:2678",
        "https://access.redhat.com/errata/RHSA-2017:2728",
        "https://access.redhat.com/errata/RHSA-2017:2860",
        "https://security.gentoo.org/glsa/201710-06",
        "https://www.postgresql.org/about/news/1772/"
      ],
      "score": 9.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "critical",
      "summary": "PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-287"
    },
    "CVE-2017-7547": {
      "id": "CVE-2017-7547",
      "references": [
        "http://www.debian.org/security/2017/dsa-3935",
        "http://www.debian.org/security/2017/dsa-3936",
        "http://www.securityfocus.com/bid/100275",
        "http://www.securitytracker.com/id/1039142",
        "https://access.redhat.com/errata/RHSA-2017:2677",
        "https://access.redhat.com/errata/RHSA-2017:2678",
        "https://access.redhat.com/errata/RHSA-2017:2728",
        "https://security.gentoo.org/glsa/201710-06",
        "https://www.postgresql.org/about/news/1772/"
      ],
      "score": 8.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-1058": {
      "id": "CVE-2018-1058",
      "references": [
        "http://www.securityfocus.com/bid/103221",
        "https://access.redhat.com/errata/RHSA-2018:2511",
        "https://access.redhat.com/errata/RHSA-2018:2566",
        "https://access.redhat.com/errata/RHSA-2018:3816",
        "https://bugzilla.redhat.com/show_bug.cgi?id=1547044",
        "https://usn.ubuntu.com/3589-1/",
        "https://www.postgresql.org/about/news/1834/"
      ],
      "score": 8.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-1115": {
      "id": "CVE-2018-1115",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html",
        "http://www.securityfocus.com/bid/104285",
        "https://access.redhat.com/errata/RHSA-2018:2565",
        "https://access.redhat.com/errata/RHSA-2018:2566",
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1115",
        "https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commitdiff%3Bh=7b34740",
        "https://security.gentoo.org/glsa/201810-08"
      ],
      "score": 9.1,
      "services": [
        "5432/postgresql"
      ],
      "severity": "critical",
      "summary": "postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
      "weakness": "CWE-732"
    },
    "CVE-2018-2562": {
      "id": "CVE-2018-2562",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102713",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102713",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 7.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2622": {
      "id": "CVE-2018-2622",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102706",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102706",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2640": {
      "id": "CVE-2018-2640",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102678",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102678",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2665": {
      "id": "CVE-2018-2665",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102681",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102681",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2668": {
      "id": "CVE-2018-2668",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102682",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
        "http://www.securityfocus.com/bid/102682",
        "http://www.securitytracker.com/id/1040216",
        "https://access.redhat.com/errata/RHSA-2018:0586",
        "https://access.redhat.com/errata/RHSA-2018:0587",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.netapp.com/advisory/ntap-20180117-0002/",
        "https://usn.ubuntu.com/3537-1/",
        "https://usn.ubuntu.com/3537-2/",
        "https://www.debian.org/security/2018/dsa-4091",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2755": {
      "id": "CVE-2018-2755",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103807",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103807",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 7.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2761": {
      "id": "CVE-2018-2761",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103820",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103820",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2767": {
      "id": "CVE-2018-2767",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/103954",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/103954",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 3.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2771": {
      "id": "CVE-2018-2771",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103828",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103828",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2781": {
      "id": "CVE-2018-2781",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103825",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103825",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2813": {
      "id": "CVE-2018-2813",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103830",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103830",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2817": {
      "id": "CVE-2018-2817",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103818",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103818",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-2819": {
      "id": "CVE-2018-2819",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103814",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
        "http://www.securityfocus.com/bid/103814",
        "http://www.securitytracker.com/id/1040698",
        "https://access.redhat.com/errata/RHSA-2018:1254",
        "https://access.redhat.com/errata/RHSA-2018:2439",
        "https://access.redhat.com/errata/RHSA-2018:2729",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html",
        "https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20180419-0002/",
        "https://usn.ubuntu.com/3629-1/",
        "https://usn.ubuntu.com/3629-2/",
        "https://usn.ubuntu.com/3629-3/",
        "https://www.debian.org/security/2018/dsa-4176",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3058": {
      "id": "CVE-2018-3058",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3063": {
      "id": "CVE-2018-3063",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104786",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104786",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3066": {
      "id": "CVE-2018-3066",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104766",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/08/msg00036.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 3.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 3.3 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3081": {
      "id": "CVE-2018-3081",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104779",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
        "http://www.securityfocus.com/bid/104779",
        "http://www.securitytracker.com/id/1041294",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20180726-0002/",
        "https://usn.ubuntu.com/3725-1/",
        "https://usn.ubuntu.com/3725-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data. CVSS 3.0 Base Score 5.0 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3133": {
      "id": "CVE-2018-3133",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3174": {
      "id": "CVE-2018-3174",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105612",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105612",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2018-3282": {
      "id": "CVE-2018-3282",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
        "http://www.securityfocus.com/bid/105610",
        "http://www.securitytracker.com/id/1041888",
        "https://access.redhat.com/errata/RHSA-2018:3655",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00004.html",
        "https://lists.debian.org/debian-lts-announce/2018/11/msg00007.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20181018-0002/",
        "https://usn.ubuntu.com/3799-1/",
        "https://usn.ubuntu.com/3799-2/",
        "https://www.debian.org/security/2018/dsa-4341"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Storage Engines). Supported versions that are affected are 5.5.61 and prior, 5.6.41 and prior, 5.7.23 and prior and 8.0.12 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-10127": {
      "id": "CVE-2019-10127",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1707098",
        "https://security.netapp.com/advisory/ntap-20210430-0004/",
        "https://www.postgresql.org/about/news/1939/"
      ],
      "score": 8.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for BigSQL-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code. An attacker having only the unprivileged Windows account can read arbitrary data directory files, essentially bypassing database-imposed read access limitations. An attacker having only the unprivileged Windows account can also delete certain data directory files.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
      "weakness": "CWE-284"
    },
    "CVE-2019-10128": {
      "id": "CVE-2019-10128",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1707102",
        "https://security.netapp.com/advisory/ntap-20210430-0004/",
        "https://www.postgresql.org/about/news/1939/"
      ],
      "score": 7.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "A vulnerability was found in postgresql versions 11.x prior to 11.3. The Windows installer for EnterpriseDB-supplied PostgreSQL does not lock down the ACL of the binary installation directory or the ACL of the data directory; it keeps the inherited ACL. In the default configuration, this allows a local attacker to read arbitrary data directory files, essentially bypassing database-imposed read access limitations. In plausible non-default configurations, an attacker having both an unprivileged Windows account and an unprivileged PostgreSQL account can cause the PostgreSQL service account to execute arbitrary code.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-284"
    },
    "CVE-2019-10210": {
      "id": "CVE-2019-10210",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10210",
        "https://www.postgresql.org/about/news/1960/"
      ],
      "score": 7,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "Postgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via superuser writing password to unprotected temporary file.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-522"
    },
    "CVE-2019-10211": {
      "id": "CVE-2019-10211",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10211",
        "https://www.postgresql.org/about/news/1960/"
      ],
      "score": 9.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "critical",
      "summary": "Postgresql Windows installer before versions 11.5, 10.10, 9.6.15, 9.5.19, 9.4.24 is vulnerable via bundled OpenSSL executing code from unprotected directory.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2455": {
      "id": "CVE-2019-2455",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106628",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106628",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2481": {
      "id": "CVE-2019-2481",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2503": {
      "id": "CVE-2019-2503",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106626",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106626",
        "https://access.redhat.com/errata/RHSA-2019:1258",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 6.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection Handling). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Difficult to exploit vulnerability allows low privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.4 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2529": {
      "id": "CVE-2019-2529",
      "references": [
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/",
        "http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
        "http://www.securityfocus.com/bid/106619",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://lists.debian.org/debian-lts-announce/2019/02/msg00000.html",
        "https://security.gentoo.org/glsa/201908-24",
        "https://security.netapp.com/advisory/ntap-20190118-0002/",
        "https://usn.ubuntu.com/3867-1/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.6.42 and prior, 5.7.24 and prior and 8.0.13 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2614": {
      "id": "CVE-2019-2614",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://support.f5.com/csp/article/K52514501",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://support.f5.com/csp/article/K52514501",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 4.4,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2627": {
      "id": "CVE-2019-2627",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://support.f5.com/csp/article/K32798641",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00032.html",
        "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00035.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
        "https://access.redhat.com/errata/RHSA-2019:2327",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://support.f5.com/csp/article/K32798641",
        "https://usn.ubuntu.com/3957-1/",
        "https://usn.ubuntu.com/3957-2/",
        "https://usn.ubuntu.com/3957-3/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.43 and prior, 5.7.25 and prior and 8.0.15 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2737": {
      "id": "CVE-2019-2737",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Pluggable Auth). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2739": {
      "id": "CVE-2019-2739",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K51272092",
        "https://support.f5.com/csp/article/K51272092?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 5.1,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 5.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2740": {
      "id": "CVE-2019-2740",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K03444640",
        "https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A55N3HZ3JZBXHQMGTUHY63FVTDU5ILEV/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN3JPT5ICOAWQNPFVPVLLYR4TQIX4MXP/",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K03444640",
        "https://support.f5.com/csp/article/K03444640?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2805": {
      "id": "CVE-2019-2805",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K04831884",
        "https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://packetstormsecurity.com/files/153862/Slackware-Security-Advisory-mariadb-Updates.html",
        "http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
        "https://access.redhat.com/errata/RHSA-2019:2484",
        "https://access.redhat.com/errata/RHSA-2019:2511",
        "https://access.redhat.com/errata/RHSA-2019:3708",
        "https://seclists.org/bugtraq/2019/Aug/1",
        "https://support.f5.com/csp/article/K04831884",
        "https://support.f5.com/csp/article/K04831884?utm_source=f5support&amp%3Butm_medium=RSS",
        "https://usn.ubuntu.com/4070-1/",
        "https://usn.ubuntu.com/4070-2/",
        "https://usn.ubuntu.com/4070-3/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Parser). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-2974": {
      "id": "CVE-2019-2974",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20191017-0002/",
        "https://usn.ubuntu.com/4195-1/",
        "https://usn.ubuntu.com/4195-2/",
        "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00037.html",
        "http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6DTUCXX5XXPNPFV2PHP6IESGTCFMZOFP/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5D3O4TOQ57KL5FLQEXH2JB2UQYHCUZ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKCJLNRK6RHFAHV7ZFD3XO7HNSBU3XOL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20191017-0002/",
        "https://usn.ubuntu.com/4195-1/",
        "https://usn.ubuntu.com/4195-2/"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 5.6.45 and prior, 5.7.27 and prior and 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2019-9193": {
      "id": "CVE-2019-9193",
      "references": [
        "http://packetstormsecurity.com/files/152757/PostgreSQL-COPY-FROM-PROGRAM-Command-Execution.html",
        "http://packetstormsecurity.com/files/166540/PostgreSQL-11.7-Remote-Code-Execution.html",
        "http://packetstormsecurity.com/files/171722/PostgreSQL-9.6.1-Remote-Code-Execution.html",
        "https://blog.hagander.net/when-a-vulnerability-is-not-a-vulnerability-244/",
        "https://medium.com/greenwolf-security/authenticated-arbitrary-command-execution-on-postgresql-9-3-latest-cd18945914d5",
        "https://paquier.xyz/postgresql-2/postgres-9-3-feature-highlight-copy-tofrom-program/",
        "https://security.netapp.com/advisory/ntap-20190502-0003/",
        "https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/authenticated-arbitrary-command-execution-on-postgresql-9-3/"
      ],
      "score": 7.2,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "In PostgreSQL 9.3 through 11.2, the \"COPY TO/FROM PROGRAM\" function allows superusers and users in the 'pg_execute_server_program' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS. NOTE: Third parties claim/state this is not an issue because PostgreSQL functionality for ‘COPY TO/FROM PROGRAM’ is acting as intended. References state that in PostgreSQL, a superuser can execute commands as the server user without using the ‘COPY FROM PROGRAM’.",
      "vector_string": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-78"
    },
    "CVE-2020-14550": {
      "id": "CVE-2020-14550",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://usn.ubuntu.com/4441-1/",
        "https://www.oracle.com/security-alerts/cpujul2020.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CAI7GRYZ5265JVKHC6VXI57MNJDDB63C/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYQPCHGCVKFS3H226QQKZFQP56JYOQ3T/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SA2XMR2ZY2BPR3VLTDVLNV74JL7TA7KL/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://usn.ubuntu.com/4441-1/",
        "https://www.oracle.com/security-alerts/cpujul2020.html"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.48 and prior, 5.7.30 and prior and 8.0.20 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-25694": {
      "id": "CVE-2020-25694",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1894423",
        "https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html",
        "https://security.gentoo.org/glsa/202012-07",
        "https://security.netapp.com/advisory/ntap-20201202-0003/",
        "https://www.postgresql.org/support/security/"
      ],
      "score": 8.1,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. If a client application that creates additional database connections only reuses the basic connection parameters while dropping security-relevant parameters, an opportunity for a man-in-the-middle attack, or the ability to observe clear-text transmissions, could exist. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-327"
    },
    "CVE-2020-25695": {
      "id": "CVE-2020-25695",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1894425",
        "https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html",
        "https://security.gentoo.org/glsa/202012-07",
        "https://security.netapp.com/advisory/ntap-20201202-0003/",
        "https://www.postgresql.org/support/security/"
      ],
      "score": 8.8,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-89"
    },
    "CVE-2020-2574": {
      "id": "CVE-2020-2574",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
        "http://www.openwall.com/lists/oss-security/2020/09/29/1",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200122-0002/",
        "https://usn.ubuntu.com/4250-1/",
        "https://usn.ubuntu.com/4250-2/",
        "https://www.oracle.com/security-alerts/cpujan2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00007.html",
        "http://www.openwall.com/lists/oss-security/2020/09/29/1",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200122-0002/",
        "https://usn.ubuntu.com/4250-1/",
        "https://usn.ubuntu.com/4250-2/",
        "https://www.oracle.com/security-alerts/cpujan2020.html"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.46 and prior, 5.7.28 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-2752": {
      "id": "CVE-2020-2752",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 5.3,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-2780": {
      "id": "CVE-2020-2780",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 6.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-2812": {
      "id": "CVE-2020-2812",
      "references": [
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00054.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/77REFDB7DE4WNKQIRGZTF53RFBQOXQLC/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SDGBQYS3A36S4CAZPV5YROHYXYZR6LAH/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TSVLI36TYRTPQGCS24VZQUXCUFOUW4VQ/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UW2ED32VEUHXFN2J3YQE27JIBV4SC2PI/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X4X2BMF3EILMTXGOZDTPYS3KT5VWLA2P/",
        "https://security.gentoo.org/glsa/202012-08",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 4.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2020-28912": {
      "id": "CVE-2020-28912",
      "references": [
        "https://hackerone.com/reports/1019891",
        "https://jira.mariadb.org/browse/MDEV-24040",
        "https://hackerone.com/reports/1019891",
        "https://jira.mariadb.org/browse/MDEV-24040"
      ],
      "score": 7,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "With MariaDB running on Windows, when local clients connect to the server over named pipes, it's possible for an unprivileged user with an ability to run code on the server machine to intercept the named pipe connection and act as a man-in-the-middle, gaining access to all the data passed between the client and the server, and getting the ability to run SQL commands on behalf of the connected user. This occurs because of an incorrect security descriptor. This affects MariaDB Server before 10.1.48, 10.2.x before 10.2.35, 10.3.x before 10.3.26, 10.4.x before 10.4.16, and 10.5.x before 10.5.7. NOTE: this issue exists because certain details of the MariaDB CVE-2019-2503 fix did not comprehensively address attack variants against MariaDB. This situation is specific to MariaDB, and thus CVE-2020-28912 does NOT apply to other vendors that were originally affected by CVE-2019-2503.",
      "vector_string": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-Other"
    },
    "CVE-2020-2922": {
      "id": "CVE-2020-2922",
      "references": [
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20200416-0003/",
        "https://usn.ubuntu.com/4350-1/",
        "https://www.oracle.com/security-alerts/cpuapr2020.html"
      ],
      "score": 3.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-2007": {
      "id": "CVE-2021-2007",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 3.7,
      "services": [
        "3306/mysql"
      ],
      "severity": "low",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-2011": {
      "id": "CVE-2021-2011",
      "references": [
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/",
        "https://security.gentoo.org/glsa/202105-27",
        "https://security.netapp.com/advisory/ntap-20210622-0001/",
        "https://www.oracle.com/security-alerts/cpujan2021.html"
      ],
      "score": 5.9,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-2144": {
      "id": "CVE-2021-2144",
      "references": [
        "https://security.netapp.com/advisory/ntap-20210513-0002/",
        "https://www.oracle.com/security-alerts/cpuapr2021.html",
        "https://security.netapp.com/advisory/ntap-20210513-0002/",
        "https://www.oracle.com/security-alerts/cpuapr2021.html"
      ],
      "score": 7.2,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-23214": {
      "id": "CVE-2021-23214",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=2022666",
        "https://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=28e24125541545483093819efae9bca603441951",
        "https://github.com/postgres/postgres/commit/28e24125541545483093819efae9bca603441951",
        "https://security.gentoo.org/glsa/202211-04",
        "https://www.postgresql.org/support/security/CVE-2021-23214/"
      ],
      "score": 8.1,
      "services": [
        "5432/postgresql"
      ],
      "severity": "high",
      "summary": "When the server is configured to use trust authentication with a clientcert requirement or to use cert authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of SSL certificate verification and encryption.",
      "vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "weakness": "CWE-89"
    },
    "CVE-2021-3393": {
      "id": "CVE-2021-3393",
      "references": [
        "https://bugzilla.redhat.com/show_bug.cgi?id=1924005",
        "https://security.gentoo.org/glsa/202105-32",
        "https://security.netapp.com/advisory/ntap-20210507-0006/"
      ],
      "score": 4.3,
      "services": [
        "5432/postgresql"
      ],
      "severity": "medium",
      "summary": "An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
      "weakness": "CWE-209"
    },
    "CVE-2021-46659": {
      "id": "CVE-2021-46659",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-25631",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220311-0003/",
        "https://jira.mariadb.org/browse/MDEV-25631",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220311-0003/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2021-46666": {
      "id": "CVE-2021-46666",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-25635",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/",
        "https://jira.mariadb.org/browse/MDEV-25635",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-617"
    },
    "CVE-2021-46667": {
      "id": "CVE-2021-46667",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-26350",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/",
        "https://jira.mariadb.org/browse/MDEV-26350",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKJRBYJAQCOPHSED43A3HUPNKQLDTFGD/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZFZVMJL5UDTOZMARLXQIMG3BTG6UNYW/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ4KDAGF3H4D4BDTHRAM6ZEAJJWWMRUO/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-190"
    },
    "CVE-2021-46669": {
      "id": "CVE-2021-46669",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-25638",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/",
        "https://jira.mariadb.org/browse/MDEV-25638",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRJCSPQHYPKTWXXZVDMY6JAHZJQ4TZ5X/",
        "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KHEOTQ63YWC3PGHGDFGS7AZIEXCGOPWH/",
        "https://mariadb.com/kb/en/security/",
        "https://security.netapp.com/advisory/ntap-20220221-0002/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-416"
    },
    "CVE-2022-27385": {
      "id": "CVE-2022-27385",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-26415",
        "https://security.netapp.com/advisory/ntap-20220526-0008/",
        "https://jira.mariadb.org/browse/MDEV-26415",
        "https://security.netapp.com/advisory/ntap-20220526-0008/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-89"
    },
    "CVE-2022-27449": {
      "id": "CVE-2022-27449",
      "references": [
        "https://jira.mariadb.org/browse/MDEV-28089",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://security.netapp.com/advisory/ntap-20220526-0006/",
        "https://jira.mariadb.org/browse/MDEV-28089",
        "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
        "https://security.netapp.com/advisory/ntap-20220526-0006/"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "NVD-CWE-noinfo"
    },
    "CVE-2022-31621": {
      "id": "CVE-2022-31621",
      "references": [
        "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://jira.mariadb.org/browse/MDEV-26574?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31622": {
      "id": "CVE-2022-31622",
      "references": [
        "https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26561?filter=-2",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31623": {
      "id": "CVE-2022-31623",
      "references": [
        "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
        "https://github.com/MariaDB/server/pull/1938",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94",
        "https://github.com/MariaDB/server/pull/1938",
        "https://jira.mariadb.org/browse/MDEV-26561",
        "https://jira.mariadb.org/browse/MDEV-26574",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2022-31624": {
      "id": "CVE-2022-31624",
      "references": [
        "https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
        "https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/",
        "https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944",
        "https://jira.mariadb.org/browse/MDEV-26556?filter=-2",
        "https://security.netapp.com/advisory/ntap-20220707-0006/"
      ],
      "score": 5.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "medium",
      "summary": "MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.",
      "vector_string": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-667"
    },
    "CVE-2023-5157": {
      "id": "CVE-2023-5157",
      "references": [
        "https://access.redhat.com/errata/RHSA-2023:5683",
        "https://access.redhat.com/errata/RHSA-2023:5684",
        "https://access.redhat.com/errata/RHSA-2023:6821",
        "https://access.redhat.com/errata/RHSA-2023:6822",
        "https://access.redhat.com/errata/RHSA-2023:6883",
        "https://access.redhat.com/errata/RHSA-2023:7633",
        "https://access.redhat.com/security/cve/CVE-2023-5157",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2240246",
        "https://access.redhat.com/errata/RHSA-2023:5683",
        "https://access.redhat.com/errata/RHSA-2023:5684",
        "https://access.redhat.com/errata/RHSA-2023:6821",
        "https://access.redhat.com/errata/RHSA-2023:6822",
        "https://access.redhat.com/errata/RHSA-2023:6883",
        "https://access.redhat.com/errata/RHSA-2023:7633",
        "https://access.redhat.com/security/cve/CVE-2023-5157",
        "https://bugzilla.redhat.com/show_bug.cgi?id=2240246"
      ],
      "score": 7.5,
      "services": [
        "3306/mysql"
      ],
      "severity": "high",
      "summary": "A vulnerability was found in MariaDB. An OpenVAS port scan on ports 3306 and 4567 allows a malicious remote client to cause a denial of service.",
      "vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
      "weakness": "CWE-400"
    }
  }
}