All the vulnerabilites related to mysql - mysql
cve-2007-5925
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.533Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27823" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "GLSA-200711-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml" }, { "name": "oval:org.mitre.oval:def:11390", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390" }, { "name": "ADV-2007-3903", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3903" }, { "name": "27649", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27649" }, { "name": "1018978", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018978" }, { "name": "USN-559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/559-1/" }, { "name": "SSA:2007-348-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "name": "DSA-1413", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "FEDORA-2007-4465", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "28040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28040" }, { "name": "RHSA-2007:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "28099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28099" }, { "name": "20071106 MySQL 5.x DoS (unknown)", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html" }, { "name": "FEDORA-2007-4471", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "name": "26353", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26353" }, { "name": "RHSA-2007:1155", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988" }, { "name": "28108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28108" }, { "name": "28025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28025" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28128" }, { "name": "MDKSA-2007:243", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=32125" }, { "name": "27568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27568" }, { "name": "mysql-hainnodb-dos(38284)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27823" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "GLSA-200711-25", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml" }, { "name": "oval:org.mitre.oval:def:11390", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390" }, { "name": "ADV-2007-3903", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3903" }, { "name": "27649", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27649" }, { "name": "1018978", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018978" }, { "name": "USN-559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/559-1/" }, { "name": "SSA:2007-348-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "name": "DSA-1413", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "FEDORA-2007-4465", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "28040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28040" }, { "name": "RHSA-2007:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "28099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28099" }, { "name": "20071106 MySQL 5.x DoS (unknown)", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html" }, { "name": "FEDORA-2007-4471", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "name": "26353", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26353" }, { "name": "RHSA-2007:1155", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988" }, { "name": "28108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28108" }, { "name": "28025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28025" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28128" }, { "name": "MDKSA-2007:243", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=32125" }, { "name": "27568", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27568" }, { "name": "mysql-hainnodb-dos(38284)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27823", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27823" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "GLSA-200711-25", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml" }, { "name": "oval:org.mitre.oval:def:11390", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390" }, { "name": "ADV-2007-3903", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3903" }, { "name": "27649", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27649" }, { "name": "1018978", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018978" }, { "name": "USN-559-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/559-1/" }, { "name": "SSA:2007-348-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "name": "DSA-1413", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "FEDORA-2007-4465", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "28040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28040" }, { "name": "RHSA-2007:1157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "28099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28099" }, { "name": "20071106 MySQL 5.x DoS (unknown)", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html" }, { "name": "FEDORA-2007-4471", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "name": "26353", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26353" }, { "name": "RHSA-2007:1155", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "name": "http://bugs.gentoo.org/show_bug.cgi?id=198988", "refsource": "CONFIRM", "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988" }, { "name": "28108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28108" }, { "name": "28025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28025" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28128" }, { "name": "MDKSA-2007:243", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "http://bugs.mysql.com/bug.php?id=32125", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=32125" }, { "name": "27568", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27568" }, { "name": "mysql-hainnodb-dos(38284)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5925", "datePublished": "2007-11-10T02:00:00", "dateReserved": "2007-11-09T00:00:00", "dateUpdated": "2024-08-07T15:47:00.533Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3679
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.968Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-binlog-command-dos(64687)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "42638", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42638" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54393" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-binlog-command-dos(64687)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "42638", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42638" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=54393" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3679", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-binlog-command-dos(64687)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "42638", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42638" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://bugs.mysql.com/bug.php?id=54393", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=54393" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628062", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3679", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.968Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-0226
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:39:35.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-1478", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1478" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29443" }, { "name": "20080104 Multiple vulnerabilities in yaSSL 1.7.5", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded" }, { "name": "28324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28324" }, { "name": "3531", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3531" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31681" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/33814" }, { "name": "27140", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27140" }, { "name": "28597", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28597" }, { "name": "ADV-2008-0560", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32222" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "20080104 Pre-auth buffer-overflow in mySQL through yaSSL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded" }, { "name": "28419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28419" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "MDVSA-2008:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "name": "yassl-inputbufferoperator-bo(39431)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431" }, { "name": "yassl-processoldclienthello-bo(39429)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3216" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-1478", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1478" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29443" }, { "name": "20080104 Multiple vulnerabilities in yaSSL 1.7.5", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded" }, { "name": "28324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28324" }, { "name": "3531", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3531" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31681" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/33814" }, { "name": "27140", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27140" }, { "name": "28597", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28597" }, { "name": "ADV-2008-0560", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32222" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "20080104 Pre-auth buffer-overflow in mySQL through yaSSL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded" }, { "name": "28419", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28419" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "MDVSA-2008:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "name": "yassl-inputbufferoperator-bo(39431)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431" }, { "name": "yassl-processoldclienthello-bo(39429)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3216" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-1478", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1478" }, { "name": "29443", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29443" }, { "name": "20080104 Multiple vulnerabilities in yaSSL 1.7.5", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded" }, { "name": "28324", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28324" }, { "name": "3531", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3531" }, { "name": "31681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31681" }, { "name": "http://bugs.mysql.com/33814", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/33814" }, { "name": "27140", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27140" }, { "name": "28597", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28597" }, { "name": "ADV-2008-0560", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "name": "32222", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32222" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "20080104 Pre-auth buffer-overflow in mySQL through yaSSL", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded" }, { "name": "28419", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28419" }, { "name": "ADV-2008-2780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "USN-588-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "MDVSA-2008:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "name": "yassl-inputbufferoperator-bo(39431)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431" }, { "name": "yassl-processoldclienthello-bo(39429)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429" }, { "name": "APPLE-SA-2008-10-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3216" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0226", "datePublished": "2008-01-10T23:00:00", "dateReserved": "2008-01-10T00:00:00", "dateUpdated": "2024-08-07T07:39:35.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0112
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0112", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0112", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3081
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:16:05.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mysql-select-dos(27212)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/437145" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/306-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mysql-select-dos(27212)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/437145" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/306-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-select-dos(27212)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "name": "19929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19929" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20060615 MySQL DoS", "refsource": "FULLDISC", "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "name": "TA06-208A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "name": "20832", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20832" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "20060614 MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437145" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "MDKSA-2006:111", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437277" }, { "name": "DSA-1112", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "18439", "refsource": "BID", "url": "http://www.securityfocus.com/bid/18439" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20871", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20871" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "20060615 Re: MySQL DoS", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "name": "USN-306-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/306-1/" }, { "name": "http://bugs.mysql.com/bug.php?id=15828", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" }, { "name": "oval:org.mitre.oval:def:9516", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3081", "datePublished": "2006-06-19T18:00:00", "dateReserved": "2006-06-19T00:00:00", "dateUpdated": "2024-08-07T18:16:05.934Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1517
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:12:22.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "name": "2006-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0028" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19929" }, { "name": "20073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20073" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "name": "20424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20424" }, { "name": "GLSA-200605-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "oval:org.mitre.oval:def:11036", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036" }, { "name": "SUSE-SA:2006:036", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "839", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/839" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/25228" }, { "name": "SUSE-SR:2006:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17780" }, { "name": "MDKSA-2006:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20762" }, { "name": "236703", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "SSA:2006-155-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20333" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "name": "20002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20002" }, { "name": "20223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20223" }, { "name": "20076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20076" }, { "name": "1016016", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016016" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "ADV-2008-1326", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20253" }, { "name": "USN-283-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/283-1/" }, { "name": "20457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "mysql-sqlparcecc-information-disclosure(26228)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228" }, { "name": "29847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29847" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "name": "2006-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0028" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19929" }, { "name": "20073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20073" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "name": "20424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20424" }, { "name": "GLSA-200605-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "oval:org.mitre.oval:def:11036", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036" }, { "name": "SUSE-SA:2006:036", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "839", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/839" }, { "name": "25228", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/25228" }, { "name": "SUSE-SR:2006:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17780" }, { "name": "MDKSA-2006:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20762" }, { "name": "236703", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "SSA:2006-155-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20333" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "name": "20002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20002" }, { "name": "20223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20223" }, { "name": "20076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20076" }, { "name": "1016016", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016016" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "ADV-2008-1326", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20253" }, { "name": "USN-283-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/283-1/" }, { "name": "20457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "mysql-sqlparcecc-information-disclosure(26228)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228" }, { "name": "29847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29847" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2006-1517", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "name": "2006-0028", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0028" }, { "name": "19929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19929" }, { "name": "20073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20073" }, { "name": "http://www.wisec.it/vulns.php?page=8", "refsource": "MISC", "url": "http://www.wisec.it/vulns.php?page=8" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "DSA-1079", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "name": "20424", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20424" }, { "name": "GLSA-200605-13", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "oval:org.mitre.oval:def:11036", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036" }, { "name": "SUSE-SA:2006:036", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "839", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/839" }, { "name": "25228", "refsource": "OSVDB", "url": "http://www.osvdb.org/25228" }, { "name": "SUSE-SR:2006:012", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17780" }, { "name": "MDKSA-2006:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20762" }, { "name": "236703", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "SSA:2006-155-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "name": "20333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20333" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "name": "20002", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20002" }, { "name": "20223", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20223" }, { "name": "20076", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20076" }, { "name": "1016016", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016016" }, { "name": "DSA-1071", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "ADV-2008-1326", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20253" }, { "name": "USN-283-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/283-1/" }, { "name": "20457", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "mysql-sqlparcecc-information-disclosure(26228)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228" }, { "name": "29847", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29847" }, { "name": "20625", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2006-1517", "datePublished": "2006-05-05T10:00:00", "dateReserved": "2006-03-30T00:00:00", "dateUpdated": "2024-08-07T17:12:22.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0116
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0116", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0116", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1516
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:12:22.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2006-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0028" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19929" }, { "name": "20073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20073" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/365938" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "name": "20424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20424" }, { "name": "GLSA-200605-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "840", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/840" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "SUSE-SA:2006:036", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "SUSE-SR:2006:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17780" }, { "name": "MDKSA-2006:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20762" }, { "name": "mysql-login-packet-info-disclosure(26236)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236" }, { "name": "236703", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "SSA:2006-155-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20333" }, { "name": "1016017", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016017" }, { "name": "20002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20002" }, { "name": "20223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20223" }, { "name": "20076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20076" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wisec.it/vulns.php?page=7" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "ADV-2008-1326", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20060502 MySQL Anonymous Login Handshake - Information Leakage.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20253" }, { "name": "USN-283-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/283-1/" }, { "name": "20457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "29847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29847" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "oval:org.mitre.oval:def:9918", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "2006-0028", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0028" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19929" }, { "name": "20073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20073" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/365938" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "name": "20424", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20424" }, { "name": "GLSA-200605-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "840", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/840" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "SUSE-SA:2006:036", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "SUSE-SR:2006:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17780" }, { "name": "MDKSA-2006:084", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20762" }, { "name": "mysql-login-packet-info-disclosure(26236)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236" }, { "name": "236703", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "SSA:2006-155-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20333" }, { "name": "1016017", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016017" }, { "name": "20002", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20002" }, { "name": "20223", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20223" }, { "name": "20076", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20076" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.wisec.it/vulns.php?page=7" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "ADV-2008-1326", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20060502 MySQL Anonymous Login Handshake - Information Leakage.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20253" }, { "name": "USN-283-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/283-1/" }, { "name": "20457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "29847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29847" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "oval:org.mitre.oval:def:9918", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2006-1516", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2006-0028", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2006/0028" }, { "name": "19929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19929" }, { "name": "20073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20073" }, { "name": "http://bugs.debian.org/365938", "refsource": "CONFIRM", "url": "http://bugs.debian.org/365938" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "DSA-1079", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "20060516 UPDATE: [ GLSA 200605-13 ] MySQL: Information leakage", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "name": "20424", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20424" }, { "name": "GLSA-200605-13", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "840", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/840" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "SUSE-SA:2006:036", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "SUSE-SR:2006:012", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17780" }, { "name": "MDKSA-2006:084", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20762" }, { "name": "mysql-login-packet-info-disclosure(26236)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236" }, { "name": "236703", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "SSA:2006-155-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "name": "20333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20333" }, { "name": "1016017", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016017" }, { "name": "20002", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20002" }, { "name": "20223", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20223" }, { "name": "20076", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20076" }, { "name": "http://www.wisec.it/vulns.php?page=7", "refsource": "MISC", "url": "http://www.wisec.it/vulns.php?page=7" }, { "name": "DSA-1071", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "ADV-2008-1326", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "20060502 MySQL Anonymous Login Handshake - Information Leakage.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded" }, { "name": "20253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20253" }, { "name": "USN-283-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/283-1/" }, { "name": "20457", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "29847", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29847" }, { "name": "20625", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "oval:org.mitre.oval:def:9918", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2006-1516", "datePublished": "2006-05-05T10:00:00", "dateReserved": "2006-03-30T00:00:00", "dateUpdated": "2024-08-07T17:12:22.153Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4031
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:57:46.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "21259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21685" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016617" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "21259", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21685" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016617" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "21259", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21259" }, { "name": "21627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21627" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "SUSE-SR:2006:023", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "ADV-2006-3079", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "name": "19279", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19279" }, { "name": "USN-338-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "31226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31226" }, { "name": "oval:org.mitre.oval:def:10468", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "21382", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21382" }, { "name": "MDKSA-2006:149", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22080" }, { "name": "21770", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21770" }, { "name": "21685", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21685" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "1016617", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016617" }, { "name": "http://bugs.mysql.com/bug.php?id=15195", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "https://issues.rpath.com/browse/RPL-568", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-568" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4031", "datePublished": "2006-08-09T22:00:00", "dateReserved": "2006-08-09T00:00:00", "dateUpdated": "2024-08-07T18:57:46.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4380
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDKSA-2006:158 | vendor-advisory, x_refsource_MANDRIVA | |
http://bugs.mysql.com/10442 | x_refsource_CONFIRM | |
http://secunia.com/advisories/21712 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/21762 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/19794 | vdb-entry, x_refsource_BID | |
http://lists.mysql.com/internals/26123 | x_refsource_CONFIRM | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686 | vdb-entry, signature, x_refsource_OVAL | |
http://www.debian.org/security/2006/dsa-1169 | vendor-advisory, x_refsource_DEBIAN | |
http://securitytracker.com/id?1016790 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T19:06:07.628Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2006:158", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/10442" }, { "name": "21712", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21712" }, { "name": "21762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21762" }, { "name": "19794", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19794" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lists.mysql.com/internals/26123" }, { "name": "oval:org.mitre.oval:def:10686", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686" }, { "name": "DSA-1169", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1169" }, { "name": "1016790", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016790" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-06-17T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDKSA-2006:158", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/10442" }, { "name": "21712", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21712" }, { "name": "21762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21762" }, { "name": "19794", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19794" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lists.mysql.com/internals/26123" }, { "name": "oval:org.mitre.oval:def:10686", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686" }, { "name": "DSA-1169", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1169" }, { "name": "1016790", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016790" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4380", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2006:158", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158" }, { "name": "http://bugs.mysql.com/10442", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/10442" }, { "name": "21712", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21712" }, { "name": "21762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21762" }, { "name": "19794", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19794" }, { "name": "http://lists.mysql.com/internals/26123", "refsource": "CONFIRM", "url": "http://lists.mysql.com/internals/26123" }, { "name": "oval:org.mitre.oval:def:10686", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686" }, { "name": "DSA-1169", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1169" }, { "name": "1016790", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016790" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4380", "datePublished": "2006-08-28T18:00:00", "dateReserved": "2006-08-28T00:00:00", "dateUpdated": "2024-08-07T19:06:07.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0115
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0115", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0115", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.594Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1848
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.730Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "RHSA-2010:0824", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "oval:org.mitre.oval:def:10258", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258" }, { "name": "oval:org.mitre.oval:def:7210", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/commits/107532" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=53371" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "RHSA-2010:0442", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "1024031", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024031" }, { "name": "MDVSA-2010:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "RHSA-2010:0824", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "oval:org.mitre.oval:def:10258", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258" }, { "name": "oval:org.mitre.oval:def:7210", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/commits/107532" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=53371" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "RHSA-2010:0442", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "1024031", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024031" }, { "name": "MDVSA-2010:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1848", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "RHSA-2010:0824", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "oval:org.mitre.oval:def:10258", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258" }, { "name": "oval:org.mitre.oval:def:7210", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "name": "http://lists.mysql.com/commits/107532", "refsource": "MISC", "url": "http://lists.mysql.com/commits/107532" }, { "name": "http://bugs.mysql.com/bug.php?id=53371", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=53371" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "RHSA-2010:0442", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "name": "SUSE-SR:2010:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "1024031", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1024031" }, { "name": "MDVSA-2010:107", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1848", "datePublished": "2010-06-07T20:00:00", "dateReserved": "2010-05-06T00:00:00", "dateUpdated": "2024-08-07T01:35:53.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-2753
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:58:51.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-1092", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1092" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lists.mysql.com/announce/364" }, { "name": "mysql-ascii-sql-injection(26875)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875" }, { "name": "20712", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20712" }, { "name": "MDKSA-2006:097", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097" }, { "name": "20541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20541" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20562" }, { "name": "2006-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2006/0034/" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "GLSA-200606-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml" }, { "name": "20365", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20365" }, { "name": "20531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20531" }, { "name": "oval:org.mitre.oval:def:10312", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312" }, { "name": "ADV-2006-2105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2105" }, { "name": "18219", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/18219" }, { "name": "20489", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20489" }, { "name": "1016216", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016216" }, { "name": "USN-303-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/303-1/" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "USN-288-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-288-3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "DSA-1092", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1092" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lists.mysql.com/announce/364" }, { "name": "mysql-ascii-sql-injection(26875)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875" }, { "name": "20712", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20712" }, { "name": "MDKSA-2006:097", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097" }, { "name": "20541", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20541" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "20562", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20562" }, { "name": "2006-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2006/0034/" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "GLSA-200606-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml" }, { "name": "20365", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20365" }, { "name": "20531", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20531" }, { "name": "oval:org.mitre.oval:def:10312", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312" }, { "name": "ADV-2006-2105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2105" }, { "name": "18219", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/18219" }, { "name": "20489", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20489" }, { "name": "1016216", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016216" }, { "name": "USN-303-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/303-1/" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "USN-288-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-288-3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20625" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-2753", "datePublished": "2006-06-01T17:00:00", "dateReserved": "2006-06-01T00:00:00", "dateUpdated": "2024-08-07T17:58:51.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0118
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0118", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0118", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0780
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743 | vendor-advisory, x_refsource_CONECTIVA | |
http://www.redhat.com/support/errata/RHSA-2003-282.html | vendor-advisory, x_refsource_REDHAT | |
http://www.mandriva.com/security/advisories?name=MDKSA-2003:094 | vendor-advisory, x_refsource_MANDRAKE | |
http://marc.info/?l=bugtraq&m=106364207129993&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html | mailing-list, x_refsource_FULLDISC | |
http://www.debian.org/security/2003/dsa-381 | vendor-advisory, x_refsource_DEBIAN | |
http://www.kb.cert.org/vuls/id/516492 | third-party-advisory, x_refsource_CERT-VN | |
http://www.redhat.com/support/errata/RHSA-2003-281.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/archive/1/337012 | mailing-list, x_refsource_BUGTRAQ | |
http://secunia.com/advisories/9709 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=106381424420775&w=2 | vendor-advisory, x_refsource_TRUSTIX |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:12.567Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "CLA-2003:743", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "name": "RHSA-2003:282", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "name": "MDKSA-2003:094", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "name": "20030913 exploit for mysql -- [get_salt_from_password] problem", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "name": "DSA-381", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-381" }, { "name": "VU#516492", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/516492" }, { "name": "RHSA-2003:281", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/337012" }, { "name": "9709", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9709" }, { "name": "2003-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "CLA-2003:743", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "name": "RHSA-2003:282", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "name": "MDKSA-2003:094", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "name": "20030913 exploit for mysql -- [get_salt_from_password] problem", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "name": "DSA-381", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-381" }, { "name": "VU#516492", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/516492" }, { "name": "RHSA-2003:281", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "name": "20030910 Buffer overflow in MySQL", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/337012" }, { "name": "9709", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9709" }, { "name": "2003-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0780", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "CLA-2003:743", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "name": "RHSA-2003:282", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "name": "MDKSA-2003:094", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "name": "20030913 exploit for mysql -- [get_salt_from_password] problem", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "name": "20030910 Buffer overflow in MySQL", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "name": "DSA-381", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-381" }, { "name": "VU#516492", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/516492" }, { "name": "RHSA-2003:281", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "name": "20030910 Buffer overflow in MySQL", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/337012" }, { "name": "9709", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9709" }, { "name": "2003-0034", "refsource": "TRUSTIX", "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0780", "datePublished": "2003-09-12T04:00:00", "dateReserved": "2003-09-11T00:00:00", "dateUpdated": "2024-08-08T02:05:12.567Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0381
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:17:14.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11557", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557" }, { "name": "9976", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/9976" }, { "name": "mysql-mysqlbug-symlink(15617)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617" }, { "name": "DSA-483", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-483" }, { "name": "GLSA-200405-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml" }, { "name": "MDKSA-2004:034", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2" }, { "name": "RHSA-2004:569", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html" }, { "name": "20040324 mysqlbug tmpfile/symlink vulnerability.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:11557", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557" }, { "name": "9976", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/9976" }, { "name": "mysql-mysqlbug-symlink(15617)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617" }, { "name": "DSA-483", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-483" }, { "name": "GLSA-200405-20", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml" }, { "name": "MDKSA-2004:034", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2" }, { "name": "RHSA-2004:569", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html" }, { "name": "20040324 mysqlbug tmpfile/symlink vulnerability.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11557", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557" }, { "name": "9976", "refsource": "BID", "url": "http://www.securityfocus.com/bid/9976" }, { "name": "mysql-mysqlbug-symlink(15617)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617" }, { "name": "DSA-483", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-483" }, { "name": "GLSA-200405-20", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml" }, { "name": "MDKSA-2004:034", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034" }, { "name": "RHSA-2004:597", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "20040414 [OpenPKG-SA-2004.014] OpenPKG Security Advisory (mysql)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2" }, { "name": "RHSA-2004:569", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html" }, { "name": "20040324 mysqlbug tmpfile/symlink vulnerability.", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0381", "datePublished": "2004-04-06T04:00:00", "dateReserved": "2004-04-05T00:00:00", "dateUpdated": "2024-08-08T00:17:14.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0711
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:21:06.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:9591", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591" }, { "name": "2005-0009", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "name": "DSA-707", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "name": "RHSA-2005:334", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "SUSE-SA:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "name": "USN-96-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/96-1/" }, { "name": "RHSA-2005:348", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "name": "20050310 Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "MDKSA-2005:060", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "name": "GLSA-200503-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "12781", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12781" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "oval:org.mitre.oval:def:9591", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591" }, { "name": "2005-0009", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "name": "DSA-707", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "name": "RHSA-2005:334", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "SUSE-SA:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "name": "USN-96-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/96-1/" }, { "name": "RHSA-2005:348", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "name": "20050310 Mysql insecure temporary file creation with CREATE TEMPORARY TABLE privilege escalation", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "MDKSA-2005:060", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "name": "GLSA-200503-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "12781", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12781" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0711", "datePublished": "2005-03-11T05:00:00", "dateReserved": "2005-03-11T00:00:00", "dateUpdated": "2024-08-07T21:21:06.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0835
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.847Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=3270" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html" }, { "name": "RHSA-2004:611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html" }, { "name": "mysql-alter-restriction-bypass(17666)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "GLSA-200410-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/13073" }, { "name": "1011606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011606" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=3270" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html" }, { "name": "RHSA-2004:611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html" }, { "name": "mysql-alter-restriction-bypass(17666)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "GLSA-200410-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/13073" }, { "name": "1011606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011606" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0835", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.mysql.com/bug.php?id=3270", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=3270" }, { "name": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html", "refsource": "CONFIRM", "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html" }, { "name": "RHSA-2004:611", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "101864", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html", "refsource": "CONFIRM", "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html" }, { "name": "mysql-alter-restriction-bypass(17666)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666" }, { "name": "RHSA-2004:597", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "GLSA-200410-22", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "http://lists.mysql.com/internals/13073", "refsource": "MISC", "url": "http://lists.mysql.com/internals/13073" }, { "name": "1011606", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011606" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0835", "datePublished": "2004-10-16T04:00:00", "dateReserved": "2004-09-08T00:00:00", "dateUpdated": "2024-08-08T00:31:47.847Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-1518
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T17:12:22.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19929" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "SUSE-SA:2006:036", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "839", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/839" }, { "name": "SUSE-SR:2006:012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/17780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20762" }, { "name": "mysql-comtabledump-bo(26232)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20333" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "name": "1016016", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016016" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20253" }, { "name": "20457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "VU#602457", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/602457" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-18T14:57:01", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "name": "19929", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19929" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "SUSE-SA:2006:036", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "839", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/839" }, { "name": "SUSE-SR:2006:012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/17780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20762" }, { "name": "mysql-comtabledump-bo(26232)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20333" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "name": "1016016", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016016" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20253" }, { "name": "20457", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "VU#602457", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/602457" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2006-1518", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20060502 MySQL COM_TABLE_DUMP Information Leakage and Arbitrary commandexecution.", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "name": "19929", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19929" }, { "name": "http://www.wisec.it/vulns.php?page=8", "refsource": "MISC", "url": "http://www.wisec.it/vulns.php?page=8" }, { "name": "DSA-1079", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "ADV-2006-1633", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "name": "SUSE-SA:2006:036", "refsource": "SUSE", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "name": "839", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/839" }, { "name": "SUSE-SR:2006:012", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "name": "17780", "refsource": "BID", "url": "http://www.securityfocus.com/bid/17780" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "name": "20241", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20241" }, { "name": "20762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20762" }, { "name": "mysql-comtabledump-bo(26232)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232" }, { "name": "20333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20333" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "name": "1016016", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016016" }, { "name": "DSA-1071", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "20253", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20253" }, { "name": "20457", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20457" }, { "name": "DSA-1073", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "VU#602457", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/602457" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2006-1518", "datePublished": "2006-05-05T10:00:00", "dateReserved": "2006-03-30T00:00:00", "dateUpdated": "2024-08-07T17:12:22.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-12419
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://mantisbt.org/bugs/view.php?id=23173 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/100142 | vdb-entry, x_refsource_BID | |
http://openwall.com/lists/oss-security/2017/08/04/6 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:36:56.181Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "name": "100142", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100142" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-08T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "name": "100142", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100142" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://mantisbt.org/bugs/view.php?id=23173", "refsource": "CONFIRM", "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "name": "100142", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100142" }, { "name": "http://openwall.com/lists/oss-security/2017/08/04/6", "refsource": "CONFIRM", "url": "http://openwall.com/lists/oss-security/2017/08/04/6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-12419", "datePublished": "2017-08-05T15:00:00", "dateReserved": "2017-08-03T00:00:00", "dateUpdated": "2024-08-05T18:36:56.181Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3834
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:12.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "mysql-derived-table-dos(64844)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=55568" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "mysql-derived-table-dos(64844)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=55568" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3834", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "mysql-derived-table-dos(64844)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640808", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "http://bugs.mysql.com/bug.php?id=55568", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=55568" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3834", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:12.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3837
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:11.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54476" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "mysql-prepared-statement-dos(64841)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=54476" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "mysql-prepared-statement-dos(64841)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "http://bugs.mysql.com/bug.php?id=54476", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=54476" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "mysql-prepared-statement-dos(64841)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640856", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3837", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:11.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-0819
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html | x_refsource_CONFIRM | |
http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/49050 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/34115 | third-party-advisory, x_refsource_SECUNIA | |
http://www.vupen.com/english/advisories/2009/0594 | vdb-entry, x_refsource_VUPEN | |
http://bugs.mysql.com/bug.php?id=42495 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/33972 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1021786 | vdb-entry, x_refsource_SECTRACK | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T04:48:52.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html" }, { "name": "mysql-xpath-dos(49050)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050" }, { "name": "34115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34115" }, { "name": "ADV-2009-0594", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0594" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=42495" }, { "name": "33972", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/33972" }, { "name": "1021786", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021786" }, { "name": "oval:org.mitre.oval:def:7544", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-02-14T00:00:00", "descriptions": [ { "lang": "en", "value": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html" }, { "name": "mysql-xpath-dos(49050)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050" }, { "name": "34115", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34115" }, { "name": "ADV-2009-0594", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0594" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=42495" }, { "name": "33972", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/33972" }, { "name": "1021786", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021786" }, { "name": "oval:org.mitre.oval:def:7544", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-0819", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html" }, { "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html" }, { "name": "mysql-xpath-dos(49050)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050" }, { "name": "34115", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34115" }, { "name": "ADV-2009-0594", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0594" }, { "name": "http://bugs.mysql.com/bug.php?id=42495", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=42495" }, { "name": "33972", "refsource": "BID", "url": "http://www.securityfocus.com/bid/33972" }, { "name": "1021786", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021786" }, { "name": "oval:org.mitre.oval:def:7544", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-0819", "datePublished": "2009-03-05T02:00:00", "dateReserved": "2009-03-04T00:00:00", "dateUpdated": "2024-08-07T04:48:52.280Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0553
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html | x_refsource_MISC | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow | x_refsource_CONFIRM | |
http://secunia.com/advisories/52445 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:30:53.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow" }, { "name": "52445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52445" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-10T22:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow" }, { "name": "52445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52445" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0553", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html", "refsource": "MISC", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow" }, { "name": "52445", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/52445" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0553", "datePublished": "2013-03-28T23:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:30:53.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-1480
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/8753 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securiteam.com/tools/5WP031FA0U.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/7500 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:28:03.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8753", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/8753" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securiteam.com/tools/5WP031FA0U.html" }, { "name": "7500", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/7500" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-10-24T23:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8753", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/8753" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securiteam.com/tools/5WP031FA0U.html" }, { "name": "7500", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/7500" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-1480", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8753", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/8753" }, { "name": "http://www.securiteam.com/tools/5WP031FA0U.html", "refsource": "MISC", "url": "http://www.securiteam.com/tools/5WP031FA0U.html" }, { "name": "7500", "refsource": "BID", "url": "http://www.securityfocus.com/bid/7500" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-1480", "datePublished": "2007-10-24T23:00:00Z", "dateReserved": "2007-10-24T00:00:00Z", "dateUpdated": "2024-09-16T22:15:13.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4019
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38573" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/48291" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "[oss-security] 20091123 Re: CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38517" }, { "name": "RHSA-2010:0109", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "FEDORA-2009-12180", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "name": "oval:org.mitre.oval:def:11349", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "name": "37717", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37717" }, { "name": "[oss-security] 20091121 Re: CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/47780" }, { "name": "oval:org.mitre.oval:def:8500", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500" }, { "name": "DSA-1997", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-1997" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "38573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38573" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/48291" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "[oss-security] 20091123 Re: CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38517" }, { "name": "RHSA-2010:0109", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "FEDORA-2009-12180", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "name": "oval:org.mitre.oval:def:11349", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "name": "37717", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37717" }, { "name": "[oss-security] 20091121 Re: CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/47780" }, { "name": "oval:org.mitre.oval:def:8500", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500" }, { "name": "DSA-1997", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-1997" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-4019", "datePublished": "2009-11-30T17:00:00", "dateReserved": "2009-11-20T00:00:00", "dateUpdated": "2024-08-07T06:45:50.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6303
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.321Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lists.mysql.com/announce/502" }, { "name": "GLSA-200804-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29706" }, { "name": "mysql-definer-value-privilege-escalation(38989)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29443" }, { "name": "MDVSA-2008:017", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-2187" }, { "name": "FEDORA-2007-4465", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "RHSA-2007:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "ADV-2007-4198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "FEDORA-2007-4471", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=29908" }, { "name": "26832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26832" }, { "name": "1019085", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019085" }, { "name": "28025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28025" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "28063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28739", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lists.mysql.com/announce/502" }, { "name": "GLSA-200804-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29706" }, { "name": "mysql-definer-value-privilege-escalation(38989)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29443" }, { "name": "MDVSA-2008:017", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-2187" }, { "name": "FEDORA-2007-4465", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "RHSA-2007:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "ADV-2007-4198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "FEDORA-2007-4471", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=29908" }, { "name": "26832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26832" }, { "name": "1019085", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019085" }, { "name": "28025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28025" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "28063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28739", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28739" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6303", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "name": "http://lists.mysql.com/announce/502", "refsource": "CONFIRM", "url": "http://lists.mysql.com/announce/502" }, { "name": "GLSA-200804-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29706" }, { "name": "mysql-definer-value-privilege-escalation(38989)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989" }, { "name": "29443", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29443" }, { "name": "MDVSA-2008:017", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "name": "https://issues.rpath.com/browse/RPL-2187", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-2187" }, { "name": "FEDORA-2007-4465", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "RHSA-2007:1157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "ADV-2007-4198", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "FEDORA-2007-4471", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "http://bugs.mysql.com/bug.php?id=29908", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=29908" }, { "name": "26832", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26832" }, { "name": "1019085", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019085" }, { "name": "28025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28025" }, { "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "USN-588-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "28063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28739", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28739" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6303", "datePublished": "2007-12-10T21:00:00", "dateReserved": "2007-12-10T00:00:00", "dateUpdated": "2024-08-07T16:02:36.321Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1621
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://bugs.mysql.com/bug.php?id=51770 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/39543 | vdb-entry, x_refsource_BID | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2010:093 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:43.062Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=51770" }, { "name": "39543", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/39543" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html" }, { "name": "MDVSA-2010:093", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=51770" }, { "name": "39543", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/39543" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html" }, { "name": "MDVSA-2010:093", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1621", "datePublished": "2010-05-14T19:24:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:43.062Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0627
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/184030 | third-party-advisory, x_refsource_CERT-VN | |
http://marc.info/?l=bugtraq&m=108904917528205&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | mailing-list, x_refsource_VULNWATCH |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "VU#184030", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/184030" }, { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "VU#184030", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/184030" }, { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "VU#184030", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/184030" }, { "name": "20040705 MySQL Authentication Bypass", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "name": "20040705 MySQL Authentication Bypass", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0627", "datePublished": "2004-07-08T04:00:00", "dateReserved": "2004-07-06T00:00:00", "dateUpdated": "2024-08-08T00:24:26.953Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2692
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27823" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29443" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "RHSA-2007:0894", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "name": "26073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26073" }, { "name": "MDVSA-2008:028", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/announce/470" }, { "name": "ADV-2007-1804", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "oval:org.mitre.oval:def:9166", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166" }, { "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "name": "1018070", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018070" }, { "name": "mysql-changedb-privilege-escalation(34348)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348" }, { "name": "25301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25301" }, { "name": "DSA-1413", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1536" }, { "name": "28637", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28637" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=27337" }, { "name": "26430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26430" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "34765", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34765" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24011", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24011" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27823" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29443" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "RHSA-2007:0894", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "name": "26073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26073" }, { "name": "MDVSA-2008:028", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/announce/470" }, { "name": "ADV-2007-1804", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "oval:org.mitre.oval:def:9166", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166" }, { "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "name": "1018070", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018070" }, { "name": "mysql-changedb-privilege-escalation(34348)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348" }, { "name": "25301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25301" }, { "name": "DSA-1413", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1536" }, { "name": "28637", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28637" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=27337" }, { "name": "26430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26430" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "34765", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34765" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24011", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24011" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2692", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27823", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27823" }, { "name": "29443", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29443" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "RHSA-2007:0894", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "name": "26073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26073" }, { "name": "MDVSA-2008:028", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!", "refsource": "MLIST", "url": "http://lists.mysql.com/announce/470" }, { "name": "ADV-2007-1804", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "oval:org.mitre.oval:def:9166", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166" }, { "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "name": "1018070", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018070" }, { "name": "mysql-changedb-privilege-escalation(34348)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348" }, { "name": "25301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25301" }, { "name": "DSA-1413", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "https://issues.rpath.com/browse/RPL-1536", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1536" }, { "name": "28637", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28637" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "http://bugs.mysql.com/bug.php?id=27337", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=27337" }, { "name": "26430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26430" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "USN-588-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "34765", "refsource": "OSVDB", "url": "http://osvdb.org/34765" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "24011", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24011" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2692", "datePublished": "2007-05-16T01:00:00", "dateReserved": "2007-05-15T00:00:00", "dateUpdated": "2024-08-07T13:49:57.306Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3680
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.952Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42598", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42598" }, { "name": "mysql-innodb-dos(64686)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54044" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42598", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42598" }, { "name": "mysql-innodb-dos(64686)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=54044" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3680", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42598", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42598" }, { "name": "mysql-innodb-dos(64686)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628192", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "http://bugs.mysql.com/bug.php?id=54044", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=54044" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3680", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3836
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:11.437Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845" }, { "name": "mysql-view-preparation-dos(64842)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54568" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845" }, { "name": "mysql-view-preparation-dos(64842)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=54568" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3836", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640845", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845" }, { "name": "mysql-view-preparation-dos(64842)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "http://bugs.mysql.com/bug.php?id=54568", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=54568" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3836", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:11.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4226
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:57:46.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:10729", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729" }, { "name": "21627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21627" }, { "name": "1016710", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016710" }, { "name": "RHSA-2007:0152", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "21762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21762" }, { "name": "ADV-2006-3306", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "21506", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21506" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "24744", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24744" }, { "name": "19559", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19559" }, { "name": "mysql-case-privilege-escalation(28448)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448" }, { "name": "MDKSA-2006:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22080" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=17647" }, { "name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/commits/5927" }, { "name": "DSA-1169", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1169" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-05-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:10729", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729" }, { "name": "21627", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21627" }, { "name": "1016710", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016710" }, { "name": "RHSA-2007:0152", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html" }, { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "21762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21762" }, { "name": "ADV-2006-3306", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "21506", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21506" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "24744", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24744" }, { "name": "19559", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19559" }, { "name": "mysql-case-privilege-escalation(28448)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448" }, { "name": "MDKSA-2006:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22080" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=17647" }, { "name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/commits/5927" }, { "name": "DSA-1169", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1169" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4226", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:10729", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729" }, { "name": "21627", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21627" }, { "name": "1016710", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016710" }, { "name": "RHSA-2007:0152", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html" }, { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "21762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21762" }, { "name": "ADV-2006-3306", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "name": "SUSE-SR:2006:023", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "21506", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21506" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "24744", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24744" }, { "name": "19559", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19559" }, { "name": "mysql-case-privilege-escalation(28448)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448" }, { "name": "MDKSA-2006:149", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "name": "22080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22080" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "name": "http://bugs.mysql.com/bug.php?id=17647", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=17647" }, { "name": "[commits] 20060504 bk commit into 4.1 tree (bar:1.2474)", "refsource": "MLIST", "url": "http://lists.mysql.com/commits/5927" }, { "name": "DSA-1169", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1169" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4226", "datePublished": "2006-08-18T19:55:00", "dateReserved": "2006-08-18T00:00:00", "dateUpdated": "2024-08-07T18:57:46.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0583
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/53061 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securitytracker.com/id?1026934 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/48890 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/49179 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:30:52.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53061", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53061" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "1026934", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48890" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-06T21:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "53061", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53061" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "1026934", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48890" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53061", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53061" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "1026934", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48890" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0583", "datePublished": "2012-05-03T22:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:30:52.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0882
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html | mailing-list, x_refsource_MLIST | |
https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html | mailing-list, x_refsource_MLIST | |
https://bugzilla.redhat.com/show_bug.cgi?id=789141 | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2012/02/24/2 | mailing-list, x_refsource_MLIST | |
https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:38:14.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[Canvas] 20120223 VulnDisco MySQL 0day", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html" }, { "name": "[Canvas] 20120207 VulnDisco Pack Professional 9.17", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141" }, { "name": "[oss-security] 20120224 Re: MySQL 0-day - does it need a CVE?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-12-21T02:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[Canvas] 20120223 VulnDisco MySQL 0day", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html" }, { "name": "[Canvas] 20120207 VulnDisco Pack Professional 9.17", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141" }, { "name": "[oss-security] 20120224 Re: MySQL 0-day - does it need a CVE?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-0882", "datePublished": "2012-12-21T02:00:00Z", "dateReserved": "2012-01-19T00:00:00Z", "dateUpdated": "2024-08-06T18:38:14.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2693
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html | x_refsource_CONFIRM | |
http://www.securitytracker.com/id?1018071 | vdb-entry, x_refsource_SECTRACK | |
http://www.vupen.com/english/advisories/2007/1804 | vdb-entry, x_refsource_VUPEN | |
http://bugs.mysql.com/bug.php?id=23675 | x_refsource_MISC | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34349 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/25301 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/24008 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "1018071", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018071" }, { "name": "ADV-2007-1804", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=23675" }, { "name": "mysql-alter-information-disclosure(34349)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349" }, { "name": "25301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25301" }, { "name": "24008", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24008" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "1018071", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018071" }, { "name": "ADV-2007-1804", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=23675" }, { "name": "mysql-alter-information-disclosure(34349)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349" }, { "name": "25301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25301" }, { "name": "24008", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24008" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2693", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "1018071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018071" }, { "name": "ADV-2007-1804", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "http://bugs.mysql.com/bug.php?id=23675", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=23675" }, { "name": "mysql-alter-information-disclosure(34349)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349" }, { "name": "25301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25301" }, { "name": "24008", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24008" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2693", "datePublished": "2007-05-16T01:00:00", "dateReserved": "2007-05-15T00:00:00", "dateUpdated": "2024-08-07T13:49:57.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3677
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:51.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "mysql-setcolumn-dos(64688)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "42646", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42646" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54575" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "mysql-setcolumn-dos(64688)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "42646", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42646" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=54575" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3677", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "mysql-setcolumn-dos(64688)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628040", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "42646", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42646" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "http://bugs.mysql.com/bug.php?id=54575", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=54575" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3677", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:51.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15945
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugs.gentoo.org/630822 | x_refsource_CONFIRM | |
https://security.gentoo.org/glsa/201711-04 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:13:05.914Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.gentoo.org/630822" }, { "name": "GLSA-201711-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201711-04" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-10-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-11T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.gentoo.org/630822" }, { "name": "GLSA-201711-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201711-04" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-15945", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.gentoo.org/630822", "refsource": "CONFIRM", "url": "https://bugs.gentoo.org/630822" }, { "name": "GLSA-201711-04", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201711-04" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-15945", "datePublished": "2017-10-27T21:00:00", "dateReserved": "2017-10-27T00:00:00", "dateUpdated": "2024-08-05T20:13:05.914Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-1420
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:59:06.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html" }, { "name": "25196", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25196" }, { "name": "24609", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24609" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1127" }, { "name": "25389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25389" }, { "name": "USN-440-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-440-1" }, { "name": "GLSA-200705-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml" }, { "name": "2413", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2413" }, { "name": "25946", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25946" }, { "name": "ADV-2007-0908", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0908" }, { "name": "20070309 SEC Consult SA-20070309-0 :: MySQL 5 Single Row Subselect Denial of Service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded" }, { "name": "24483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24483" }, { "name": "1017746", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1017746" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.sec-consult.com/284.html" }, { "name": "MDKSA-2007:139", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=24630" }, { "name": "oval:org.mitre.oval:def:9530", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530" }, { "name": "22900", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22900" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-03-09T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html" }, { "name": "25196", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25196" }, { "name": "24609", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24609" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1127" }, { "name": "25389", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25389" }, { "name": "USN-440-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-440-1" }, { "name": "GLSA-200705-11", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml" }, { "name": "2413", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2413" }, { "name": "25946", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25946" }, { "name": "ADV-2007-0908", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0908" }, { "name": "20070309 SEC Consult SA-20070309-0 :: MySQL 5 Single Row Subselect Denial of Service", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded" }, { "name": "24483", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24483" }, { "name": "1017746", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1017746" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.sec-consult.com/284.html" }, { "name": "MDKSA-2007:139", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=24630" }, { "name": "oval:org.mitre.oval:def:9530", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530" }, { "name": "22900", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22900" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1420", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html" }, { "name": "25196", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25196" }, { "name": "24609", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24609" }, { "name": "https://issues.rpath.com/browse/RPL-1127", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1127" }, { "name": "25389", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25389" }, { "name": "USN-440-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-440-1" }, { "name": "GLSA-200705-11", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml" }, { "name": "2413", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2413" }, { "name": "25946", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25946" }, { "name": "ADV-2007-0908", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0908" }, { "name": "20070309 SEC Consult SA-20070309-0 :: MySQL 5 Single Row Subselect Denial of Service", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded" }, { "name": "24483", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24483" }, { "name": "1017746", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1017746" }, { "name": "http://www.sec-consult.com/284.html", "refsource": "MISC", "url": "http://www.sec-consult.com/284.html" }, { "name": "MDKSA-2007:139", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "http://bugs.mysql.com/bug.php?id=24630", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=24630" }, { "name": "oval:org.mitre.oval:def:9530", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530" }, { "name": "22900", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22900" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1420", "datePublished": "2007-03-12T23:00:00", "dateReserved": "2007-03-12T00:00:00", "dateUpdated": "2024-08-07T12:59:06.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2446
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:52:14.762Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html" }, { "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38517" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "1022533", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1022533" }, { "name": "55734", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/55734" }, { "name": "oval:org.mitre.oval:def:11857", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857" }, { "name": "ADV-2009-1857", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1857" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "mysql-dispatchcommand-format-string(51614)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614" }, { "name": "MDVSA-2009:179", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179" }, { "name": "35609", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35609" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "name": "35767", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35767" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36566" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-07-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html" }, { "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38517" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "1022533", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1022533" }, { "name": "55734", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/55734" }, { "name": "oval:org.mitre.oval:def:11857", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857" }, { "name": "ADV-2009-1857", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1857" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "mysql-dispatchcommand-format-string(51614)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614" }, { "name": "MDVSA-2009:179", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179" }, { "name": "35609", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35609" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "name": "35767", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35767" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36566" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html" }, { "name": "20090708 MySQL \u003c= 5.0.45 post auth format string vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded" }, { "name": "38517", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38517" }, { "name": "USN-897-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "RHSA-2009:1289", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "APPLE-SA-2010-03-29-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "1022533", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1022533" }, { "name": "55734", "refsource": "OSVDB", "url": "http://www.osvdb.org/55734" }, { "name": "oval:org.mitre.oval:def:11857", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857" }, { "name": "ADV-2009-1857", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1857" }, { "name": "http://support.apple.com/kb/HT4077", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4077" }, { "name": "mysql-dispatchcommand-format-string(51614)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614" }, { "name": "MDVSA-2009:179", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179" }, { "name": "35609", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35609" }, { "name": "RHSA-2010:0110", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "name": "35767", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35767" }, { "name": "36566", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36566" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2446", "datePublished": "2009-07-13T17:00:00", "dateReserved": "2009-07-13T00:00:00", "dateUpdated": "2024-08-07T05:52:14.762Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-7232
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/29443 | third-party-advisory, x_refsource_SECUNIA | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720 | vdb-entry, signature, x_refsource_OVAL | |
http://secunia.com/advisories/31687 | third-party-advisory, x_refsource_SECUNIA | |
http://bugs.mysql.com/bug.php?id=22413 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/28351 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/30351 | third-party-advisory, x_refsource_SECUNIA | |
http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/usn-588-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.redhat.com/support/errata/RHSA-2008-0364.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:40.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SR:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29443" }, { "name": "oval:org.mitre.oval:def:11720", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720" }, { "name": "31687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31687" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=22413" }, { "name": "28351", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28351" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-27T00:00:00", "descriptions": [ { "lang": "en", "value": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "SUSE-SR:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html" }, { "name": "29443", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29443" }, { "name": "oval:org.mitre.oval:def:11720", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720" }, { "name": "31687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31687" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=22413" }, { "name": "28351", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28351" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html" }, { "name": "USN-588-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-7232", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SUSE-SR:2008:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html" }, { "name": "29443", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29443" }, { "name": "oval:org.mitre.oval:def:11720", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720" }, { "name": "31687", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31687" }, { "name": "http://bugs.mysql.com/bug.php?id=22413", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=22413" }, { "name": "28351", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28351" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html" }, { "name": "USN-588-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-7232", "datePublished": "2008-02-26T18:00:00", "dateReserved": "2008-02-26T00:00:00", "dateUpdated": "2024-08-07T20:57:40.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0102
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/72521 | vdb-entry, x_refsource_XF | |
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://osvdb.org/78379 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mysql-serveruns2-dos(72521)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "78379", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78379" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "mysql-serveruns2-dos(72521)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "78379", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78379" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-serveruns2-dos(72521)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "78379", "refsource": "OSVDB", "url": "http://osvdb.org/78379" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0102", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6304
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "name": "28343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28343" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lists.mysql.com/announce/502" }, { "name": "GLSA-200804-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29706" }, { "name": "42609", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/42609" }, { "name": "MDVSA-2008:028", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "name": "MDVSA-2008:017", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-2187" }, { "name": "DSA-1451", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1451" }, { "name": "USN-559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/559-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=29801" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "ADV-2007-4198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "28637", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28637" }, { "name": "26832", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26832" }, { "name": "1019085", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019085" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "name": "mysql-federated-engine-dos(38990)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28128" }, { "name": "28063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28739", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28739" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "name": "28343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28343" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lists.mysql.com/announce/502" }, { "name": "GLSA-200804-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29706" }, { "name": "42609", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/42609" }, { "name": "MDVSA-2008:028", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "name": "MDVSA-2008:017", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-2187" }, { "name": "DSA-1451", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1451" }, { "name": "USN-559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/559-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=29801" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "ADV-2007-4198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "28637", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28637" }, { "name": "26832", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26832" }, { "name": "1019085", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019085" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "name": "mysql-federated-engine-dos(38990)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28128" }, { "name": "28063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28739", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28739" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6304", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "name": "28343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28343" }, { "name": "http://lists.mysql.com/announce/502", "refsource": "CONFIRM", "url": "http://lists.mysql.com/announce/502" }, { "name": "GLSA-200804-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29706" }, { "name": "42609", "refsource": "OSVDB", "url": "http://osvdb.org/42609" }, { "name": "MDVSA-2008:028", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "name": "MDVSA-2008:017", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "name": "https://issues.rpath.com/browse/RPL-2187", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-2187" }, { "name": "DSA-1451", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1451" }, { "name": "USN-559-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/559-1/" }, { "name": "http://bugs.mysql.com/bug.php?id=29801", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=29801" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "name": "ADV-2007-4198", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "28637", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28637" }, { "name": "26832", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26832" }, { "name": "1019085", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019085" }, { "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "name": "20080205 rPSA-2008-0040-1 mysql mysql-bench mysql-server", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "name": "mysql-federated-engine-dos(38990)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28128" }, { "name": "28063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "28739", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28739" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6304", "datePublished": "2007-12-10T21:00:00", "dateReserved": "2007-12-10T00:00:00", "dateUpdated": "2024-08-07T16:02:36.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3486
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/27635 | vdb-entry, x_refsource_XF | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html | x_refsource_MISC | |
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html | x_refsource_MISC | |
http://bugs.mysql.com/bug.php?id=20622 | x_refsource_MISC | |
http://www.vupen.com/english/advisories/2006/2700 | vdb-entry, x_refsource_VUPEN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:34.268Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mysql-instancemanager-dos(27635)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=20622" }, { "name": "ADV-2006-2700", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2700" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-19T15:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mysql-instancemanager-dos(27635)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=20622" }, { "name": "ADV-2006-2700", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2700" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-instancemanager-dos(27635)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html", "refsource": "MISC", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html", "refsource": "MISC", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html" }, { "name": "http://bugs.mysql.com/bug.php?id=20622", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=20622" }, { "name": "ADV-2006-2700", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2700" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3486", "datePublished": "2006-07-10T21:00:00", "dateReserved": "2006-07-10T00:00:00", "dateUpdated": "2024-08-07T18:30:34.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-1492
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html | x_refsource_MISC | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/52445 | third-party-advisory, x_refsource_SECUNIA | |
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html | x_refsource_MISC | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:04:49.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "52445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/52445" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-03-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-10T22:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "52445", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/52445" }, { "tags": [ "x_refsource_MISC" ], "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2013-1492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html", "refsource": "MISC", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "52445", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/52445" }, { "name": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html", "refsource": "MISC", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow", "refsource": "CONFIRM", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2013-1492", "datePublished": "2013-03-28T23:00:00", "dateReserved": "2013-01-30T00:00:00", "dateUpdated": "2024-08-06T15:04:49.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0628
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=108904917528205&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | mailing-list, x_refsource_VULNWATCH | |
http://www.kb.cert.org/vuls/id/645326 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16612 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.959Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "name": "VU#645326", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/645326" }, { "name": "mysql-myrnd-bo(16612)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-07-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "name": "20040705 MySQL Authentication Bypass", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "name": "VU#645326", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/645326" }, { "name": "mysql-myrnd-bo(16612)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20040705 MySQL Authentication Bypass", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "name": "20040705 MySQL Authentication Bypass", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "name": "VU#645326", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/645326" }, { "name": "mysql-myrnd-bo(16612)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0628", "datePublished": "2004-07-08T04:00:00", "dateReserved": "2004-07-06T00:00:00", "dateUpdated": "2024-08-08T00:24:26.959Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1850
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.857Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1024033", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024033" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "oval:org.mitre.oval:def:6693", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "name": "oval:org.mitre.oval:def:10846", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "RHSA-2010:0442", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=53237" }, { "name": "MDVSA-2010:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1024033", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024033" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "oval:org.mitre.oval:def:6693", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "name": "oval:org.mitre.oval:def:10846", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "RHSA-2010:0442", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=53237" }, { "name": "MDVSA-2010:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1850", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1024033", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1024033" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "oval:org.mitre.oval:def:6693", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "name": "oval:org.mitre.oval:def:10846", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "RHSA-2010:0442", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "name": "http://bugs.mysql.com/bug.php?id=53237", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=53237" }, { "name": "MDVSA-2010:107", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1850", "datePublished": "2010-06-07T20:00:00", "dateReserved": "2010-05-06T00:00:00", "dateUpdated": "2024-08-07T01:35:53.857Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2262
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2011-2262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2011-2262", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-06-02T00:00:00", "dateUpdated": "2024-08-06T22:53:17.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4098
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:00:42.841Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2009:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "RHSA-2009:1067", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25" }, { "name": "USN-671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38517" }, { "name": "oval:org.mitre.oval:def:10591", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "32769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32769" }, { "name": "[oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20" }, { "name": "[oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3" }, { "name": "32759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32759" }, { "name": "mysql-myisam-symlink-security-bypass(45649)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649" }, { "name": "DSA-1662", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1662" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "name": "SUSE-SR:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "32578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32578" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-09T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDVSA-2009:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "RHSA-2009:1067", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25" }, { "name": "USN-671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38517" }, { "name": "oval:org.mitre.oval:def:10591", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "32769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32769" }, { "name": "[oss-security] 20080909 Re: CVE request: MySQL incomplete fix for CVE-2008-2079", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20" }, { "name": "[oss-security] 20080916 Re: CVE request: MySQL incomplete fix for CVE-2008-2079", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3" }, { "name": "32759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32759" }, { "name": "mysql-myisam-symlink-security-bypass(45649)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649" }, { "name": "DSA-1662", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1662" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "name": "SUSE-SR:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "32578", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32578" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-4098", "datePublished": "2008-09-17T18:06:00", "dateReserved": "2008-09-15T00:00:00", "dateUpdated": "2024-08-07T10:00:42.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3840
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:11.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "RHSA-2010:0824", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=51875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/commits/117094" }, { "name": "mysql-gislinestringinitfromwkb-dos(64838)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "RHSA-2010:0824", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=51875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/commits/117094" }, { "name": "mysql-gislinestringinitfromwkb-dos(64838)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3840", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "RHSA-2010:0824", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "http://bugs.mysql.com/bug.php?id=51875", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=51875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640865", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "http://lists.mysql.com/commits/117094", "refsource": "MISC", "url": "http://lists.mysql.com/commits/117094" }, { "name": "mysql-gislinestringinitfromwkb-dos(64838)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3840", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:11.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0113
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.687Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0113", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.687Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0075
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://osvdb.org/78374 | vdb-entry, x_refsource_OSVDB | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72539 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/bid/51526 | vdb-entry, x_refsource_BID | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.510Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "78374", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78374" }, { "name": "mysql-server-cve20120075(72539)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "51526", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51526" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "78374", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78374" }, { "name": "mysql-server-cve20120075(72539)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "51526", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51526" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "78374", "refsource": "OSVDB", "url": "http://osvdb.org/78374" }, { "name": "mysql-server-cve20120075(72539)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "51526", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51526" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0075", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.510Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3838
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:11.936Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-longblob-dos(64840)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54461" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function\u0027s result is \"processed using an intermediate temporary table.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-longblob-dos(64840)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=54461" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function\u0027s result is \"processed using an intermediate temporary table.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-longblob-dos(64840)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640858", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "http://bugs.mysql.com/bug.php?id=54461", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=54461" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3838", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:11.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2749
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2012-1462.html | vendor-advisory, x_refsource_REDHAT | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://rhn.redhat.com/errata/RHSA-2013-0180.html | vendor-advisory, x_refsource_REDHAT | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
https://bugzilla.redhat.com/show_bug.cgi?id=833737 | x_refsource_CONFIRM | |
http://secunia.com/advisories/51309 | third-party-advisory, x_refsource_SECUNIA | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.securityfocus.com/bid/55120 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:42:32.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2012:1462", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "RHSA-2013:0180", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737" }, { "name": "51309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51309" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "55120", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/55120" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-10T22:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2012:1462", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "RHSA-2013:0180", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737" }, { "name": "51309", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51309" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "55120", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/55120" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2749", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2012:1462", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "RHSA-2013:0180", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=833737", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737" }, { "name": "51309", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/51309" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "55120", "refsource": "BID", "url": "http://www.securityfocus.com/bid/55120" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2749", "datePublished": "2012-08-17T00:00:00", "dateReserved": "2012-05-14T00:00:00", "dateUpdated": "2024-08-06T19:42:32.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4028
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:50.954Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:8510", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510" }, { "name": "RHSA-2010:0109", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "[oss-security] 20091119 mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "name": "[commits] 20091020 bzr commit into mysql-4.1 branch (joro:2709) Bug#47320", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/commits/87446" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "name": "oval:org.mitre.oval:def:10940", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/47320" }, { "name": "[oss-security] 20091123 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "oval:org.mitre.oval:def:8510", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510" }, { "name": "RHSA-2010:0109", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "[oss-security] 20091119 mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "name": "[commits] 20091020 bzr commit into mysql-4.1 branch (joro:2709) Bug#47320", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/commits/87446" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "name": "[oss-security] 20091121 CVE Request - MySQL - 5.0.88", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "name": "oval:org.mitre.oval:def:10940", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/47320" }, { "name": "[oss-security] 20091123 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-4028", "datePublished": "2009-11-30T17:00:00", "dateReserved": "2009-11-20T00:00:00", "dateUpdated": "2024-08-07T06:45:50.954Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-2079
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:49:57.795Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html" }, { "name": "SUSE-SR:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "name": "USN-671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "name": "mysql-myisam-security-bypass(42267)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267" }, { "name": "1019995", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019995" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "31687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31687" }, { "name": "oval:org.mitre.oval:def:10133", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31226" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "30134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30134" }, { "name": "32769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32769" }, { "name": "APPLE-SA-2009-09-10-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "MDVSA-2008:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32222" }, { "name": "ADV-2008-1472", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1472/references" }, { "name": "31066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31066" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3865" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html" }, { "name": "36701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36701" }, { "name": "RHSA-2008:0505", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "29106", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/29106" }, { "name": "RHSA-2008:0510", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "name": "MDVSA-2008:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "name": "DSA-1608", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1608" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36566" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3216" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-03-15T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html" }, { "name": "SUSE-SR:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "name": "USN-671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "name": "mysql-myisam-security-bypass(42267)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267" }, { "name": "1019995", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019995" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "31687", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31687" }, { "name": "oval:org.mitre.oval:def:10133", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31226" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "30134", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30134" }, { "name": "32769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32769" }, { "name": "APPLE-SA-2009-09-10-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "name": "MDVSA-2008:149", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32222" }, { "name": "ADV-2008-1472", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1472/references" }, { "name": "31066", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31066" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3865" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html" }, { "name": "36701", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36701" }, { "name": "RHSA-2008:0505", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "29106", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/29106" }, { "name": "RHSA-2008:0510", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "name": "MDVSA-2008:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "name": "DSA-1608", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1608" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36566" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3216" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2008-2079", "datePublished": "2008-05-05T16:00:00", "dateReserved": "2008-05-05T00:00:00", "dateUpdated": "2024-08-07T08:49:57.795Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3681
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "RHSA-2010:0824", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "mysql-handler-interface-dos(64685)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54007" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "42633", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42633" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "RHSA-2010:0824", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "mysql-handler-interface-dos(64685)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=54007" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "42633", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42633" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3681", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628680", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "RHSA-2010:0824", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "mysql-handler-interface-dos(64685)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "http://bugs.mysql.com/bug.php?id=54007", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=54007" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "SUSE-SR:2010:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "42633", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42633" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3681", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-4227
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:57:46.439Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mysql-grant-execute-privilege-escalation(28442)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442" }, { "name": "ADV-2006-3306", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "oval:org.mitre.oval:def:10105", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105" }, { "name": "USN-338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "21506", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21506" }, { "name": "19559", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19559" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22080" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "name": "21770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21770" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "name": "1016709", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1016709" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=18630" }, { "name": "[commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/commits/7918" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-20T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mysql-grant-execute-privilege-escalation(28442)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442" }, { "name": "ADV-2006-3306", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "name": "SUSE-SR:2006:023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "oval:org.mitre.oval:def:10105", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105" }, { "name": "USN-338-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "21506", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21506" }, { "name": "19559", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19559" }, { "name": "22080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22080" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "name": "21770", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21770" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "name": "1016709", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1016709" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=18630" }, { "name": "[commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/commits/7918" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-4227", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-grant-execute-privilege-escalation(28442)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442" }, { "name": "ADV-2006-3306", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "name": "SUSE-SR:2006:023", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "name": "oval:org.mitre.oval:def:10105", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105" }, { "name": "USN-338-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "name": "21506", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21506" }, { "name": "19559", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19559" }, { "name": "22080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22080" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "name": "21770", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21770" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "1016709", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1016709" }, { "name": "RHSA-2007:0083", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "http://bugs.mysql.com/bug.php?id=18630", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=18630" }, { "name": "[commits] 20060620 bk commit into 5.0 tree (kroki:1.2168) BUG#18630", "refsource": "MLIST", "url": "http://lists.mysql.com/commits/7918" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-4227", "datePublished": "2006-08-18T19:55:00", "dateReserved": "2006-08-18T00:00:00", "dateUpdated": "2024-08-07T18:57:46.439Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-5026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=640177 | x_refsource_CONFIRM | |
http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html | x_refsource_CONFIRM | |
http://bugs.mysql.com/bug.php?id=49124 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html | x_refsource_CONFIRM | |
http://seclists.org/oss-sec/2011/q4/101 | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/49179 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:24:53.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=49124" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html" }, { "name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://seclists.org/oss-sec/2011/q4/101" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49179" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-10-13T09:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=49124" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html" }, { "name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://seclists.org/oss-sec/2011/q4/101" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49179" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2009-5026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640177", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html" }, { "name": "http://bugs.mysql.com/bug.php?id=49124", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=49124" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html" }, { "name": "[oss-security] 20111018 Re: MySQL executable comment execution on MySQL slave server (from 2009)", "refsource": "MLIST", "url": "http://seclists.org/oss-sec/2011/q4/101" }, { "name": "49179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49179" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-5026", "datePublished": "2012-08-17T00:00:00", "dateReserved": "2010-12-09T00:00:00", "dateUpdated": "2024-08-07T07:24:53.981Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3839
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:12.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=53544" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "mysql-invocations-dos(64839)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=53544" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "mysql-invocations-dos(64839)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3839", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "http://bugs.mysql.com/bug.php?id=53544", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=53544" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "mysql-invocations-dos(64839)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640861", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3839", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:12.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-0903
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:48:56.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2006:064", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=17667" }, { "name": "oval:org.mitre.oval:def:9915", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "19034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19034" }, { "name": "20060225 mysql \u003c= 5.0.18", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rst.void.ru/papers/advisory39.txt" }, { "name": "USN-274-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-274-2" }, { "name": "16850", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16850" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20241" }, { "name": "USN-274-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/274-1/" }, { "name": "1015693", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015693" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20333" }, { "name": "19502", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19502" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "ADV-2006-0752", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0752" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20253" }, { "name": "19814", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19814" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20625" }, { "name": "mysql-query-log-bypass-security(24966)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "MDKSA-2006:064", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=17667" }, { "name": "oval:org.mitre.oval:def:9915", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915" }, { "name": "DSA-1079", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1079" }, { "name": "19034", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19034" }, { "name": "20060225 mysql \u003c= 5.0.18", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://rst.void.ru/papers/advisory39.txt" }, { "name": "USN-274-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-274-2" }, { "name": "16850", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16850" }, { "name": "20241", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20241" }, { "name": "USN-274-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/274-1/" }, { "name": "1015693", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015693" }, { "name": "20333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20333" }, { "name": "19502", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19502" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "name": "DSA-1071", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1071" }, { "name": "RHSA-2007:0083", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "name": "ADV-2006-0752", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0752" }, { "name": "20253", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20253" }, { "name": "19814", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19814" }, { "name": "DSA-1073", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1073" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "20625", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20625" }, { "name": "mysql-query-log-bypass-security(24966)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966" }, { "name": "RHSA-2006:0544", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2006-0903", "datePublished": "2006-02-27T23:00:00", "dateReserved": "2006-02-27T00:00:00", "dateUpdated": "2024-08-07T16:48:56.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-7247
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T11:56:14.541Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38517" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=39277" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619" }, { "name": "MDVSA-2010:044", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044" }, { "name": "38043", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/38043" }, { "name": "[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/commits/59711" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-11-24T00:00:00", "descriptions": [ { "lang": "en", "value": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38517" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=39277" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619" }, { "name": "MDVSA-2010:044", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044" }, { "name": "38043", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/38043" }, { "name": "[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/commits/59711" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-7247", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "38517", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38517" }, { "name": "ADV-2010-1107", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "USN-897-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "http://bugs.mysql.com/bug.php?id=39277", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=39277" }, { "name": "APPLE-SA-2010-03-29-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "http://support.apple.com/kb/HT4077", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "name": "SUSE-SR:2010:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=543619", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619" }, { "name": "MDVSA-2010:044", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044" }, { "name": "38043", "refsource": "BID", "url": "http://www.securityfocus.com/bid/38043" }, { "name": "[commits] 20081124 bzr commit into mysql-6.0-backup branch (ingo.struewing:2744) Bug#39277", "refsource": "MLIST", "url": "http://lists.mysql.com/commits/59711" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-7247", "datePublished": "2009-11-30T17:00:00", "dateReserved": "2009-11-25T00:00:00", "dateUpdated": "2024-08-07T11:56:14.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-1636
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.zataz.net/adviso/mysql-05172005.txt | x_refsource_MISC | |
http://secunia.com/advisories/15369 | third-party-advisory, x_refsource_SECUNIA | |
http://secunia.com/advisories/17080 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=full-disclosure&m=111632686805498&w=2 | mailing-list, x_refsource_FULLDISC | |
http://www.securityfocus.com/bid/13660 | vdb-entry, x_refsource_BID | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504 | vdb-entry, signature, x_refsource_OVAL | |
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:045 | vendor-advisory, x_refsource_MANDRIVA | |
http://www.redhat.com/support/errata/RHSA-2005-685.html | vendor-advisory, x_refsource_REDHAT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:59:23.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zataz.net/adviso/mysql-05172005.txt" }, { "name": "15369", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/15369" }, { "name": "17080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17080" }, { "name": "20050517 MySQL \u003c 4.0.12 \u0026\u0026 MySQL \u003c= 5.0.4 : Insecure tmp", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2" }, { "name": "13660", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13660" }, { "name": "oval:org.mitre.oval:def:9504", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688" }, { "name": "MDKSA-2006:045", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045" }, { "name": "RHSA-2005:685", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file\u0027s contents." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.zataz.net/adviso/mysql-05172005.txt" }, { "name": "15369", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/15369" }, { "name": "17080", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17080" }, { "name": "20050517 MySQL \u003c 4.0.12 \u0026\u0026 MySQL \u003c= 5.0.4 : Insecure tmp", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2" }, { "name": "13660", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13660" }, { "name": "oval:org.mitre.oval:def:9504", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688" }, { "name": "MDKSA-2006:045", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045" }, { "name": "RHSA-2005:685", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-1636", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file\u0027s contents." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.zataz.net/adviso/mysql-05172005.txt", "refsource": "MISC", "url": "http://www.zataz.net/adviso/mysql-05172005.txt" }, { "name": "15369", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/15369" }, { "name": "17080", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17080" }, { "name": "20050517 MySQL \u003c 4.0.12 \u0026\u0026 MySQL \u003c= 5.0.4 : Insecure tmp", "refsource": "FULLDISC", "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2" }, { "name": "13660", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13660" }, { "name": "oval:org.mitre.oval:def:9504", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688" }, { "name": "MDKSA-2006:045", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045" }, { "name": "RHSA-2005:685", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-1636", "datePublished": "2005-05-17T04:00:00", "dateReserved": "2005-05-17T00:00:00", "dateUpdated": "2024-08-07T21:59:23.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3676
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://bugs.mysql.com/bug.php?id=55039 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=628660 | x_refsource_CONFIRM | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:012 | vendor-advisory, x_refsource_MANDRIVA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/64689 | vdb-entry, x_refsource_XF | |
http://www.vupen.com/english/advisories/2011/0133 | vdb-entry, x_refsource_VUPEN | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/42643 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2010/09/28/10 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=55039" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "mysql-dictocrea-dos(64689)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "42643", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42643" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=55039" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "mysql-dictocrea-dos(64689)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "42643", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42643" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3676", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.mysql.com/bug.php?id=55039", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=55039" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628660", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "mysql-dictocrea-dos(64689)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "42643", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42643" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3676", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0837
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1011606" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-10-11T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1011606" }, { "tags": [ "x_refsource_MISC" ], "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.mysql.com/internals/16174", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16174" }, { "name": "RHSA-2004:611", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "name": "12783", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/12783/" }, { "name": "DSA-562", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-562" }, { "name": "20041125 [USN-32-1] mysql vulnerabilities", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "name": "http://lists.mysql.com/internals/16173", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16173" }, { "name": "mysql-union-dos(17667)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "name": "101864", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "11357", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11357" }, { "name": "CLA-2004:892", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "name": "RHSA-2004:597", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "name": "P-018", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "name": "http://lists.mysql.com/internals/16168", "refsource": "MISC", "url": "http://lists.mysql.com/internals/16168" }, { "name": "GLSA-200410-22", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "name": "2004-0054", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2004/0054/" }, { "name": "http://bugs.mysql.com/2408", "refsource": "MISC", "url": "http://bugs.mysql.com/2408" }, { "name": "1011606", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1011606" }, { "name": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15", "refsource": "MISC", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c@1.15" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0837", "datePublished": "2004-10-16T04:00:00", "dateReserved": "2004-09-08T00:00:00", "dateUpdated": "2024-08-08T00:31:47.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2558
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.178Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DSA-831", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-831" }, { "name": "mysql-user-defined-function-bo(21737)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737" }, { "name": "MDKSA-2005:163", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html" }, { "name": "USN-180-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://www.ubuntu.com/usn/usn-180-2/" }, { "name": "USN-180-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://www.ubuntu.com/usn/usn-180-1/" }, { "name": "SUSE-SR:2005:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html" }, { "name": "DSA-833", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-833" }, { "name": "DSA-829", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-829" }, { "name": "20381", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20381" }, { "name": "14509", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14509" }, { "name": "236703", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "FLSA-2006:167803", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2" }, { "name": "ADV-2008-1326", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "SCOSA-2006.18", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt" }, { "name": "17027", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17027" }, { "name": "29847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29847" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "DSA-831", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-831" }, { "name": "mysql-user-defined-function-bo(21737)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737" }, { "name": "MDKSA-2005:163", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html" }, { "name": "USN-180-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://www.ubuntu.com/usn/usn-180-2/" }, { "name": "USN-180-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://www.ubuntu.com/usn/usn-180-1/" }, { "name": "SUSE-SR:2005:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html" }, { "name": "DSA-833", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-833" }, { "name": "DSA-829", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-829" }, { "name": "20381", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20381" }, { "name": "14509", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14509" }, { "name": "236703", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "FLSA-2006:167803", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2" }, { "name": "ADV-2008-1326", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "SCOSA-2006.18", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt" }, { "name": "17027", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17027" }, { "name": "29847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29847" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2558", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "DSA-831", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-831" }, { "name": "mysql-user-defined-function-bo(21737)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737" }, { "name": "MDKSA-2005:163", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html" }, { "name": "USN-180-2", "refsource": "UBUNTU", "url": "https://www.ubuntu.com/usn/usn-180-2/" }, { "name": "USN-180-1", "refsource": "UBUNTU", "url": "https://www.ubuntu.com/usn/usn-180-1/" }, { "name": "SUSE-SR:2005:021", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html" }, { "name": "DSA-833", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-833" }, { "name": "DSA-829", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-829" }, { "name": "20381", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20381" }, { "name": "14509", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14509" }, { "name": "236703", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "name": "FLSA-2006:167803", "refsource": "FEDORA", "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html" }, { "name": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html", "refsource": "MISC", "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2" }, { "name": "ADV-2008-1326", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "name": "SCOSA-2006.18", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt" }, { "name": "17027", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17027" }, { "name": "29847", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29847" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2558", "datePublished": "2005-08-16T04:00:00", "dateReserved": "2005-08-16T00:00:00", "dateUpdated": "2024-08-07T22:30:01.178Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3682
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "mysql-itemsinglerowsubselect-dos(64684)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42599", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42599" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=52711" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "mysql-itemsinglerowsubselect-dos(64684)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42599", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42599" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=52711" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3682", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "mysql-itemsinglerowsubselect-dos(64684)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42599", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42599" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "http://bugs.mysql.com/bug.php?id=52711", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=52711" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628328", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3682", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-2691
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=27515" }, { "name": "27823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27823" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "RHSA-2007:0894", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "name": "26073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26073" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "1018069", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018069" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31226" }, { "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/announce/470" }, { "name": "ADV-2007-1804", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "mysql-renametable-weak-security(34347)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347" }, { "name": "25946", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25946" }, { "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "name": "24016", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/24016" }, { "name": "25301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25301" }, { "name": "DSA-1413", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "34766", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/34766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1536" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32222" }, { "name": "USN-528-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/528-1/" }, { "name": "MDKSA-2007:139", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30351" }, { "name": "27155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27155" }, { "name": "26430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/26430" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:9559", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=27515" }, { "name": "27823", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27823" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "RHSA-2007:0894", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "name": "26073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26073" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31681" }, { "name": "1018069", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018069" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31226" }, { "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/announce/470" }, { "name": "ADV-2007-1804", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "mysql-renametable-weak-security(34347)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347" }, { "name": "25946", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25946" }, { "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "name": "24016", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/24016" }, { "name": "25301", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25301" }, { "name": "DSA-1413", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "34766", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/34766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1536" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32222" }, { "name": "USN-528-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/528-1/" }, { "name": "MDKSA-2007:139", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "name": "30351", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30351" }, { "name": "27155", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27155" }, { "name": "26430", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/26430" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "RHSA-2008:0364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:9559", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2691", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.mysql.com/bug.php?id=27515", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=27515" }, { "name": "27823", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27823" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "name": "RHSA-2007:0894", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "name": "26073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26073" }, { "name": "31681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31681" }, { "name": "1018069", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018069" }, { "name": "31226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31226" }, { "name": "[announce] 20070712 MySQL Community Server 5.0.45 has been released!", "refsource": "MLIST", "url": "http://lists.mysql.com/announce/470" }, { "name": "ADV-2007-1804", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "name": "RHSA-2008:0768", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "mysql-renametable-weak-security(34347)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347" }, { "name": "25946", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25946" }, { "name": "20070717 rPSA-2007-0143-1 mysql mysql-bench mysql-server", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "name": "24016", "refsource": "BID", "url": "http://www.securityfocus.com/bid/24016" }, { "name": "25301", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25301" }, { "name": "DSA-1413", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "name": "34766", "refsource": "OSVDB", "url": "http://osvdb.org/34766" }, { "name": "https://issues.rpath.com/browse/RPL-1536", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1536" }, { "name": "32222", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32222" }, { "name": "USN-528-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/528-1/" }, { "name": "MDKSA-2007:139", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "name": "30351", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30351" }, { "name": "27155", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27155" }, { "name": "26430", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/26430" }, { "name": "ADV-2008-2780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "RHSA-2008:0364", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "name": "APPLE-SA-2008-10-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3216" }, { "name": "oval:org.mitre.oval:def:9559", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2691", "datePublished": "2007-05-16T01:00:00", "dateReserved": "2007-05-15T00:00:00", "dateUpdated": "2024-08-07T13:49:57.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0485
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://osvdb.org/78383 | vdb-entry, x_refsource_OSVDB | |
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/51513 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72526 | vdb-entry, x_refsource_XF | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.993Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "78383", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78383" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51513", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51513" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "mysql-serveruns4-dos(72526)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "78383", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78383" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51513", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51513" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "mysql-serveruns4-dos(72526)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0485", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "78383", "refsource": "OSVDB", "url": "http://osvdb.org/78383" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51513", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51513" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "mysql-serveruns4-dos(72526)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0485", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:23:30.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0484
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/51515 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/78372 | vdb-entry, x_refsource_OSVDB | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72525 | vdb-entry, x_refsource_XF | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:31.049Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51515", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51515" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "78372", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78372" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "mysql-server-info-disc(72525)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51515", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51515" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "78372", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78372" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "mysql-server-info-disc(72525)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0484", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51515", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51515" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "78372", "refsource": "OSVDB", "url": "http://osvdb.org/78372" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "mysql-server-info-disc(72525)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0484", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:23:31.049Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3833
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:12.217Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "mysql-extremevalue-dos(64845)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=55826" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "mysql-extremevalue-dos(64845)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=55826" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3833", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640751", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "mysql-extremevalue-dos(64845)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "http://bugs.mysql.com/bug.php?id=55826", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=55826" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3833", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:12.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0492
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72537 | vdb-entry, x_refsource_XF | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://osvdb.org/78393 | vdb-entry, x_refsource_OSVDB | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/51516 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:30.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "mysql-serveruns14-dos(72537)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "78393", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78393" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "51516", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51516" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "mysql-serveruns14-dos(72537)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "78393", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78393" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "51516", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51516" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "mysql-serveruns14-dos(72537)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "78393", "refsource": "OSVDB", "url": "http://osvdb.org/78393" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "51516", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51516" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0492", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:23:30.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-2573
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/21738 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=112360618320729&w=2 | mailing-list, x_refsource_BUGTRAQ | |
http://www.appsecinc.com/resources/alerts/mysql/2005-001.html | x_refsource_MISC | |
http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA | x_refsource_CONFIRM | |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html | mailing-list, x_refsource_FULLDISC | |
http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.636Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "mysql-udf-directory-traversal(21738)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-08T00:00:00", "descriptions": [ { "lang": "en", "value": "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "mysql-udf-directory-traversal(21738)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2573", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "mysql-udf-directory-traversal(21738)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2" }, { "name": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html", "refsource": "MISC", "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" }, { "name": "http://mysql.bkbits.net:8080/mysql-4.0/cset@428b981bg2iwh3CbGANDaF-W6DbttA", "refsource": "CONFIRM", "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset@428b981bg2iwh3CbGANDaF-W6DbttA" }, { "name": "20050808 [AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions", "refsource": "FULLDISC", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" }, { "name": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch@428b981bg2iwh3CbGANDaF-W6DbttA", "refsource": "CONFIRM", "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch@428b981bg2iwh3CbGANDaF-W6DbttA" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2573", "datePublished": "2005-08-16T04:00:00", "dateReserved": "2005-08-16T00:00:00", "dateUpdated": "2024-08-07T22:30:01.636Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1696
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/53071 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1026934 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/48890 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/49179 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "53071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53071" }, { "name": "1026934", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48890" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-06T21:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "53071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53071" }, { "name": "1026934", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48890" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-1696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "53071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53071" }, { "name": "1026934", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48890" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-1696", "datePublished": "2012-05-03T22:00:00", "dateReserved": "2012-03-16T00:00:00", "dateUpdated": "2024-08-06T19:08:38.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0087
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://www.securityfocus.com/bid/51509 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72519 | vdb-entry, x_refsource_XF | |
http://osvdb.org/78377 | vdb-entry, x_refsource_OSVDB | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51509", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51509" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "mysql-serveruns-dos(72519)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519" }, { "name": "78377", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78377" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51509", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51509" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "mysql-serveruns-dos(72519)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519" }, { "name": "78377", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78377" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0087", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "51509", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51509" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "mysql-serveruns-dos(72519)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519" }, { "name": "78377", "refsource": "OSVDB", "url": "http://osvdb.org/78377" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0087", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-4030
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:45:51.096Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "38573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38573" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38517" }, { "name": "RHSA-2010:0109", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "[oss-security] 20091119 mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11116", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "name": "[commits] 20091110 bzr commit into mysql-5.0-bugteam branch (joro:2845) Bug#32167", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/commits/89940" }, { "name": "oval:org.mitre.oval:def:8156", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156" }, { "name": "DSA-1997", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-1997" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-11-05T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "38573", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38573" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38517" }, { "name": "RHSA-2010:0109", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "name": "ADV-2010-1107", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "SUSE-SR:2010:011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "[oss-security] 20091119 mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "[oss-security] 20091124 Re: mysql-5.1.41", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "name": "oval:org.mitre.oval:def:11116", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "name": "[commits] 20091110 bzr commit into mysql-5.0-bugteam branch (joro:2845) Bug#32167", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/commits/89940" }, { "name": "oval:org.mitre.oval:def:8156", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156" }, { "name": "DSA-1997", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-1997" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2009-4030", "datePublished": "2009-11-30T17:00:00", "dateReserved": "2009-11-20T00:00:00", "dateUpdated": "2024-08-07T06:45:51.096Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3963
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:00:41.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=35658" }, { "name": "MDVSA-2009:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "RHSA-2009:1067", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html" }, { "name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7" }, { "name": "ADV-2008-2554", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2554" }, { "name": "USN-671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.gentoo.org/237166" }, { "name": "mysql-bitstring-dos(45042)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042" }, { "name": "DSA-1783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1783" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "32769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32769" }, { "name": "32759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32759" }, { "name": "34907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34907" }, { "name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4" }, { "name": "SUSE-SR:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36566" }, { "name": "31769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31769" }, { "name": "1020858", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1020858" }, { "name": "oval:org.mitre.oval:def:10521", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-06-30T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b\u0027\u0027 (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=35658" }, { "name": "MDVSA-2009:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "RHSA-2009:1067", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html" }, { "name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7" }, { "name": "ADV-2008-2554", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2554" }, { "name": "USN-671-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.gentoo.org/237166" }, { "name": "mysql-bitstring-dos(45042)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042" }, { "name": "DSA-1783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1783" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "32769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32769" }, { "name": "32759", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32759" }, { "name": "34907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34907" }, { "name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4" }, { "name": "SUSE-SR:2008:025", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36566" }, { "name": "31769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31769" }, { "name": "1020858", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1020858" }, { "name": "oval:org.mitre.oval:def:10521", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3963", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b\u0027\u0027 (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.mysql.com/bug.php?id=35658", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=35658" }, { "name": "MDVSA-2009:094", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "RHSA-2009:1067", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html" }, { "name": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html" }, { "name": "[oss-security] 20080909 Re: CVE request: MySQL empty bit-string literal server crash", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7" }, { "name": "ADV-2008-2554", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2554" }, { "name": "USN-671-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "name": "https://bugs.gentoo.org/237166", "refsource": "CONFIRM", "url": "https://bugs.gentoo.org/237166" }, { "name": "mysql-bitstring-dos(45042)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042" }, { "name": "DSA-1783", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1783" }, { "name": "RHSA-2009:1289", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "32769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32769" }, { "name": "32759", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32759" }, { "name": "34907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34907" }, { "name": "[oss-security] 20080909 CVE request: MySQL empty bit-string literal server crash", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4" }, { "name": "SUSE-SR:2008:025", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "name": "36566", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36566" }, { "name": "31769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31769" }, { "name": "1020858", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1020858" }, { "name": "oval:org.mitre.oval:def:10521", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3963", "datePublished": "2008-09-10T15:00:00", "dateReserved": "2008-09-09T00:00:00", "dateUpdated": "2024-08-07T10:00:41.996Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0114
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0114", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.813Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0101
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72520 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://osvdb.org/78378 | vdb-entry, x_refsource_OSVDB | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.585Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-serveruns1-dos(72520)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "78378", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78378" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-serveruns1-dos(72520)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "78378", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78378" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0101", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-serveruns1-dos(72520)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "78378", "refsource": "OSVDB", "url": "http://osvdb.org/78378" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0101", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.585Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0709
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:21:06.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2005-0009", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "name": "DSA-707", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2" }, { "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html" }, { "name": "RHSA-2005:334", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "SUSE-SA:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "name": "USN-96-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/96-1/" }, { "name": "RHSA-2005:348", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "MDKSA-2005:060", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "name": "GLSA-200503-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "name": "oval:org.mitre.oval:def:10479", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "12781", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12781" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "2005-0009", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "name": "DSA-707", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2" }, { "name": "20050310 Mysql CREATE FUNCTION libc arbitrary code execution.", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html" }, { "name": "RHSA-2005:334", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "SUSE-SA:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "name": "USN-96-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/96-1/" }, { "name": "RHSA-2005:348", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "MDKSA-2005:060", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "name": "GLSA-200503-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "name": "oval:org.mitre.oval:def:10479", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "12781", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12781" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0709", "datePublished": "2005-03-11T05:00:00", "dateReserved": "2005-03-11T00:00:00", "dateUpdated": "2024-08-07T21:21:06.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1849
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:53.805Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "oval:org.mitre.oval:def:7328", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.mysql.com/commits/106060" }, { "name": "1024032", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024032" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "MDVSA-2010:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "oval:org.mitre.oval:def:7328", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.mysql.com/commits/106060" }, { "name": "1024032", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024032" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "MDVSA-2010:107", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-1849", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "oval:org.mitre.oval:def:7328", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" }, { "name": "http://bugs.mysql.com/bug.php?id=50974", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "name": "http://support.apple.com/kb/HT4435", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4435" }, { "name": "APPLE-SA-2010-11-10-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "name": "http://lists.mysql.com/commits/106060", "refsource": "MISC", "url": "http://lists.mysql.com/commits/106060" }, { "name": "1024032", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1024032" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "name": "SUSE-SR:2010:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "MDVSA-2010:107", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-1849", "datePublished": "2010-06-07T20:00:00", "dateReserved": "2010-05-06T00:00:00", "dateUpdated": "2024-08-07T01:35:53.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-4456
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:17:09.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20081029 Re: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded" }, { "name": "MDVSA-2009:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-commandline-xss(45590)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590" }, { "name": "oval:org.mitre.oval:def:11456", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456" }, { "name": "20081008 Re: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38517" }, { "name": "DSA-1783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1783" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=27884" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "32072", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32072" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "20080930 MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability" }, { "name": "20081004 RE: RE: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://seclists.org/bugtraq/2008/Oct/0026.html" }, { "name": "4357", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/4357" }, { "name": "34907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34907" }, { "name": "20080930 RE: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36566" }, { "name": "31486", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-09-30T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20081029 Re: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded" }, { "name": "MDVSA-2009:094", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-commandline-xss(45590)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590" }, { "name": "oval:org.mitre.oval:def:11456", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456" }, { "name": "20081008 Re: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded" }, { "name": "38517", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38517" }, { "name": "DSA-1783", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1783" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=27884" }, { "name": "USN-897-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "RHSA-2009:1289", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "32072", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32072" }, { "name": "APPLE-SA-2010-03-29-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "20080930 MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4077" }, { "name": "RHSA-2010:0110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability" }, { "name": "20081004 RE: RE: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://seclists.org/bugtraq/2008/Oct/0026.html" }, { "name": "4357", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/4357" }, { "name": "34907", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34907" }, { "name": "20080930 RE: MySQL command-line client HTML injection vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded" }, { "name": "36566", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36566" }, { "name": "31486", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31486" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20081029 Re: MySQL command-line client HTML injection vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded" }, { "name": "MDVSA-2009:094", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "mysql-commandline-xss(45590)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590" }, { "name": "oval:org.mitre.oval:def:11456", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456" }, { "name": "20081008 Re: MySQL command-line client HTML injection vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded" }, { "name": "38517", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38517" }, { "name": "DSA-1783", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1783" }, { "name": "http://bugs.mysql.com/bug.php?id=27884", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=27884" }, { "name": "USN-897-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-897-1" }, { "name": "RHSA-2009:1289", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "name": "32072", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32072" }, { "name": "APPLE-SA-2010-03-29-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "name": "20080930 MySQL command-line client HTML injection vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded" }, { "name": "http://support.apple.com/kb/HT4077", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4077" }, { "name": "RHSA-2010:0110", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "name": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability", "refsource": "MISC", "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability" }, { "name": "20081004 RE: RE: MySQL command-line client HTML injection vulnerability", "refsource": "BUGTRAQ", "url": "http://seclists.org/bugtraq/2008/Oct/0026.html" }, { "name": "4357", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/4357" }, { "name": "34907", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34907" }, { "name": "20080930 RE: MySQL command-line client HTML injection vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded" }, { "name": "36566", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36566" }, { "name": "31486", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31486" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4456", "datePublished": "2008-10-06T23:00:00", "dateReserved": "2008-10-06T00:00:00", "dateUpdated": "2024-08-07T10:17:09.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3835
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:26:11.487Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO", "x_transferred" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "mysql-uservariable-dos(64843)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=55564" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "tags": [ "vendor-advisory", "x_refsource_TURBO" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "DSA-2143", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "mysql-uservariable-dos(64843)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=55564" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819" }, { "name": "MDVSA-2010:223", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3835", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "http://support.apple.com/kb/HT4723", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4723" }, { "name": "42875", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42875" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "APPLE-SA-2011-06-23-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "name": "TLSA-2011-3", "refsource": "TURBO", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "name": "ADV-2011-0105", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "name": "MDVSA-2010:222", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "DSA-2143", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "name": "43676", "refsource": "BID", "url": "http://www.securityfocus.com/bid/43676" }, { "name": "ADV-2011-0345", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "name": "mysql-uservariable-dos(64843)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "RHSA-2010:0825", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "name": "http://bugs.mysql.com/bug.php?id=55564", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=55564" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=640819", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819" }, { "name": "MDVSA-2010:223", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3835", "datePublished": "2011-01-14T18:00:00", "dateReserved": "2010-10-07T00:00:00", "dateUpdated": "2024-08-07T03:26:11.487Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0120
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0120", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0120", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1626
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "40257", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/40257" }, { "name": "oval:org.mitre.oval:def:9490", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490" }, { "name": "[oss-security] 20100518 Re: A mysql flaw.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4" }, { "name": "ADV-2010-1194", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/1194" }, { "name": "1024004", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1024004" }, { "name": "[oss-security] 20100510 Re: A mysql flaw.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2" }, { "name": "MDVSA-2010:101", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=40980" }, { "name": "RHSA-2010:0442", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL before 5.1.46 allows local users to delete the data and index files of another user\u0027s MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "40257", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/40257" }, { "name": "oval:org.mitre.oval:def:9490", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490" }, { "name": "[oss-security] 20100518 Re: A mysql flaw.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4" }, { "name": "ADV-2010-1194", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/1194" }, { "name": "1024004", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1024004" }, { "name": "[oss-security] 20100510 Re: A mysql flaw.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2" }, { "name": "MDVSA-2010:101", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=40980" }, { "name": "RHSA-2010:0442", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-1626", "datePublished": "2010-05-21T17:00:00", "dateReserved": "2010-04-29T00:00:00", "dateUpdated": "2024-08-07T01:28:41.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3683
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=52512" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698" }, { "name": "42625", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42625" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "mysql-ok-packet-dos(64683)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=52512" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "name": "SUSE-SR:2010:021", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698" }, { "name": "42625", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42625" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "mysql-ok-packet-dos(64683)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3683", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "http://bugs.mysql.com/bug.php?id=52512", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=52512" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "SUSE-SR:2010:021", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628698", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698" }, { "name": "42625", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42625" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "mysql-ok-packet-dos(64683)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3683", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0490
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72531 | vdb-entry, x_refsource_XF | |
http://osvdb.org/78388 | vdb-entry, x_refsource_OSVDB | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/51524 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html | vendor-advisory, x_refsource_SUSE | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:23:31.105Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "mysql-serveruns9-dos(72531)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531" }, { "name": "78388", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78388" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "51524", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51524" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "mysql-serveruns9-dos(72531)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531" }, { "name": "78388", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78388" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "51524", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51524" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "mysql-serveruns9-dos(72531)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531" }, { "name": "78388", "refsource": "OSVDB", "url": "http://osvdb.org/78388" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "51524", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51524" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "SUSE-SU-2012:0984", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0490", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2012-01-11T00:00:00", "dateUpdated": "2024-08-06T18:23:31.105Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2009-2942
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.osvdb.org/59030 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/37047 | third-party-advisory, x_refsource_SECUNIA | |
http://www.debian.org/security/2009/dsa-1910 | vendor-advisory, x_refsource_DEBIAN | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:279 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T06:07:37.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "59030", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/59030" }, { "name": "37047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37047" }, { "name": "DSA-1910", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1910" }, { "name": "MDVSA-2009:279", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-10-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2009-10-27T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "59030", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/59030" }, { "name": "37047", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37047" }, { "name": "DSA-1910", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1910" }, { "name": "MDVSA-2009:279", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-2942", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "59030", "refsource": "OSVDB", "url": "http://www.osvdb.org/59030" }, { "name": "37047", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37047" }, { "name": "DSA-1910", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1910" }, { "name": "MDVSA-2009:279", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-2942", "datePublished": "2009-10-22T16:00:00", "dateReserved": "2009-08-23T00:00:00", "dateUpdated": "2024-08-07T06:07:37.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-3678
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:18:52.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=54477" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42596", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/42596" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/bug.php?id=54477" }, { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42596", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/42596" }, { "name": "USN-1017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2011:012", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "RHSA-2011:0164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42936" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172" }, { "name": "SUSE-SR:2010:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-3678", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://bugs.mysql.com/bug.php?id=54477", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/bug.php?id=54477" }, { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "42596", "refsource": "BID", "url": "http://www.securityfocus.com/bid/42596" }, { "name": "USN-1017-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "name": "MDVSA-2011:012", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "name": "RHSA-2011:0164", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "name": "ADV-2011-0170", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "name": "ADV-2011-0133", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "name": "MDVSA-2010:155", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "name": "42936", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42936" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=628172", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172" }, { "name": "SUSE-SR:2010:019", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "name": "[oss-security] 20100928 Re: CVE Request -- MySQL v5.1.49 -- multiple DoS flaws", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-3678", "datePublished": "2011-01-11T19:00:00", "dateReserved": "2010-09-28T00:00:00", "dateUpdated": "2024-08-07T03:18:52.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3469
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:30:34.063Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "GLSA-200608-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml" }, { "name": "19032", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/19032" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/31226" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "USN-321-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-321-1" }, { "name": "21147", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21147" }, { "name": "21366", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/21366" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.mysql.com/bug.php?id=20729" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694" }, { "name": "oval:org.mitre.oval:def:9827", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "DSA-1112", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24479" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-07-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "TA07-072A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "GLSA-200608-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml" }, { "name": "19032", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/19032" }, { "name": "APPLE-SA-2007-03-13", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "31226", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/31226" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "USN-321-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-321-1" }, { "name": "21147", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21147" }, { "name": "21366", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/21366" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.mysql.com/bug.php?id=20729" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694" }, { "name": "oval:org.mitre.oval:def:9827", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "DSA-1112", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "ADV-2007-0930", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "24479", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24479" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-3469", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "TA07-072A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "name": "GLSA-200608-09", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml" }, { "name": "19032", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19032" }, { "name": "APPLE-SA-2007-03-13", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "name": "31226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/31226" }, { "name": "http://docs.info.apple.com/article.html?artnum=305214", "refsource": "CONFIRM", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "name": "RHSA-2008:0768", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "name": "USN-321-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-321-1" }, { "name": "21147", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21147" }, { "name": "21366", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21366" }, { "name": "http://bugs.mysql.com/bug.php?id=20729", "refsource": "MISC", "url": "http://bugs.mysql.com/bug.php?id=20729" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694", "refsource": "MISC", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694" }, { "name": "oval:org.mitre.oval:def:9827", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827" }, { "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "name": "DSA-1112", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "name": "ADV-2007-0930", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "name": "24479", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24479" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-3469", "datePublished": "2006-07-18T23:00:00", "dateReserved": "2006-07-10T00:00:00", "dateUpdated": "2024-08-07T18:30:34.063Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2005-0710
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T21:21:06.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2005-0009", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2" }, { "name": "DSA-707", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "name": "RHSA-2005:334", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "SUSE-SA:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "name": "USN-96-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/96-1/" }, { "name": "RHSA-2005:348", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "MDKSA-2005:060", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "name": "mysql-udfinit-gain-access(19658)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658" }, { "name": "GLSA-200503-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "name": "oval:org.mitre.oval:def:10180", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "12781", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12781" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-03-10T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-03T20:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "2005-0009", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2" }, { "name": "DSA-707", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "name": "RHSA-2005:334", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "name": "101864", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "name": "SUSE-SA:2005:019", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "name": "USN-96-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/96-1/" }, { "name": "RHSA-2005:348", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "name": "20050310 Mysql CREATE FUNCTION mysql.func table arbitrary library injection", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html" }, { "name": "APPLE-SA-2005-08-15", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "name": "MDKSA-2005:060", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "name": "mysql-udfinit-gain-access(19658)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658" }, { "name": "GLSA-200503-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "name": "oval:org.mitre.oval:def:10180", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180" }, { "name": "APPLE-SA-2005-08-17", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "name": "12781", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12781" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2005-0710", "datePublished": "2005-03-11T05:00:00", "dateReserved": "2005-03-11T00:00:00", "dateUpdated": "2024-08-07T21:21:06.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2575
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html | vendor-advisory, x_refsource_SUSE | |
https://security.netapp.com/advisory/ntap-20150417-0003/ | x_refsource_CONFIRM | |
http://www.debian.org/security/2016/dsa-3621 | vendor-advisory, x_refsource_DEBIAN | |
http://www.securityfocus.com/bid/74075 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1032121 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:17:27.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2015:0967", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20150417-0003/" }, { "name": "DSA-3621", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3621" }, { "name": "74075", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/74075" }, { "name": "1032121", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1032121" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "SUSE-SU-2015:0946", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-09T10:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "openSUSE-SU-2015:0967", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20150417-0003/" }, { "name": "DSA-3621", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3621" }, { "name": "74075", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/74075" }, { "name": "1032121", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1032121" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "SUSE-SU-2015:0946", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2015-2575", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2015:0967", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html" }, { "name": "https://security.netapp.com/advisory/ntap-20150417-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20150417-0003/" }, { "name": "DSA-3621", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3621" }, { "name": "74075", "refsource": "BID", "url": "http://www.securityfocus.com/bid/74075" }, { "name": "1032121", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1032121" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "name": "SUSE-SU-2015:0946", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2015-2575", "datePublished": "2015-04-16T16:00:00", "dateReserved": "2015-03-20T00:00:00", "dateUpdated": "2024-08-06T05:17:27.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-2102
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/ | x_refsource_MISC | |
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15 | x_refsource_MISC | |
http://www.securityfocus.com/bid/52931 | vdb-entry, x_refsource_BID | |
http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/04/13/7 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:07.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15" }, { "name": "52931", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52931" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html" }, { "name": "[oss-security] 20120413 Re: CVE request: mysql: Server crash on HANDLER READ NEXT after DELETE", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-10T22:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "tags": [ "x_refsource_MISC" ], "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15" }, { "name": "52931", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52931" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html" }, { "name": "[oss-security] 20120413 Re: CVE request: mysql: Server crash on HANDLER READ NEXT after DELETE", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-2102", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/", "refsource": "MISC", "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/" }, { "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15", "refsource": "MISC", "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15" }, { "name": "52931", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52931" }, { "name": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html" }, { "name": "[oss-security] 20120413 Re: CVE request: mysql: Server crash on HANDLER READ NEXT after DELETE", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2102", "datePublished": "2012-08-17T00:00:00", "dateReserved": "2012-04-04T00:00:00", "dateUpdated": "2024-08-06T19:26:07.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-0119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.ubuntu.com/usn/USN-1397-1 | vendor-advisory, x_refsource_UBUNTU | |
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://secunia.com/advisories/48250 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html | x_refsource_CONFIRM | |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 | x_refsource_CONFIRM | |
http://www.debian.org/security/2012/dsa-2429 | vendor-advisory, x_refsource_DEBIAN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:16:18.520Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-20T17:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "USN-1397-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2429" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-0119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-1397-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "48250", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48250" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687", "refsource": "CONFIRM", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "name": "DSA-2429", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2429" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-0119", "datePublished": "2012-01-18T22:00:00", "dateReserved": "2011-12-12T00:00:00", "dateUpdated": "2024-08-06T18:16:18.520Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via vectors related to \"materializing a derived table that required a temporary table for grouping\" and \"user variable assignments.\"" }, { "lang": "es", "value": "Vulnerabilidad no especificada en MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de vectores relacionados con la materializaci\u00f3n de una tabla derivada que requiere una tabla temporal para la agrupaci\u00f3n y tambi\u00e9n relacionados con las asignaciones de variables de usuario." } ], "id": "CVE-2010-3834", "lastModified": "2024-11-21T01:19:42.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:27.983", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=55568" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=55568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640808" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64844" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | * | |
mysql | mysql | * | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 6.10 | |
canonical | ubuntu_linux | 7.04 | |
canonical | ubuntu_linux | 7.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "A29B62B6-C1E2-4807-B259-03532829FB78", "versionEndExcluding": "5.0.32", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A9E6A4F-D24A-40D6-9952-B9AD0BBBB3BB", "versionEndExcluding": "5.1.14", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY." }, { "lang": "es", "value": "sql_select.cc en MySQL 5.0.x anterior a 5.0.32 y 5.1.x anterior a 5.1.14 permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante un EXPLAIN SELECT FROM en la tabla INFORMATION_SCHEMA como se ha demostrado utilizando ORDER BY." } ], "id": "CVE-2006-7232", "lastModified": "2024-11-21T00:24:41.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=22413" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29443" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31687" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/28351" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=22413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-32.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-14.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/29443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/28351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11720" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect the MySQL packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 as they did not support INFORMATION_SCHEMA, introduced in MySQL version 5.\n\nMySQL packages as shipped in Red Hat Enterprise Linux 5 were fixed via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0364.html\n\nThe MySQL packages as shipped in Red Hat Application Stack v1 and v2 are based on upstream version which has the fix included.", "lastModified": "2008-07-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows local users to affect confidentiality and integrity via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios locales afectar a la confidencialidad y a la integridad de los datos a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-0114", "lastModified": "2024-11-21T01:34:24.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 2.7, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.553", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
debian | debian_linux | 8.0 | |
suse | linux_enterprise_desktop | 11 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_server | 11 | |
suse | linux_enterprise_software_development_kit | 11 | |
mysql | mysql | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "8B072472-B463-4647-885D-E40B0115C810", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:vmware:*:*:*:*:*", "matchCriteriaId": "3A0D502F-9D9C-4D97-B030-141DDE88D4CE", "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*", "matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "2682C8CC-279E-40E9-9370-CC387CE9FE21", "versionEndIncluding": "5.1.34", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Connectors en Oracle MySQL 5.1.34 y anteriores permite a usuarios remotos autenticados afectar la confidencialidad a trav\u00e9s de vectores desconocidos relacionados con Connector/J." } ], "id": "CVE-2015-2575", "lastModified": "2024-11-21T02:27:38.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-04-16T17:00:07.253", "references": [ { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3621" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/74075" }, { "source": "secalert_us@oracle.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032121" }, { "source": "secalert_us@oracle.com", "url": "https://security.netapp.com/advisory/ntap-20150417-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-updates/2015-05/msg00089.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3621" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/74075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1032121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20150417-0003/" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.0 | |
mysql | mysql | 4.1.3 | |
mysql | mysql | 4.1.10 | |
oracle | mysql | 3.23.49 | |
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.12 | |
oracle | mysql | 4.0.13 | |
oracle | mysql | 4.0.14 | |
oracle | mysql | 4.0.15 | |
oracle | mysql | 4.0.18 | |
oracle | mysql | 4.0.20 | |
oracle | mysql | 4.0.21 | |
oracle | mysql | 4.0.23 | |
oracle | mysql | 4.1.0 | |
oracle | mysql | 4.1.2 | |
oracle | mysql | 4.1.3 | |
oracle | mysql | 4.1.4 | |
oracle | mysql | 4.1.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit." } ], "id": "CVE-2005-0709", "lastModified": "2024-11-20T23:55:44.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/12781" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479" }, { "source": "secalert@redhat.com", "url": "https://usn.ubuntu.com/96-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111066115808506\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/12781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/96-1/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 does not properly propagate type errors, which allows remote attackers to cause a denial of service (server crash) via crafted arguments to extreme-value functions such as (1) LEAST and (2) GREATEST, related to KILL_BAD_DATA and a \"CREATE TABLE ... SELECT.\"" }, { "lang": "es", "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 no propaga adecuadamente los errores de tipo, lo cual permite provocar a atacantes remotos una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de argumentos especiales a las funciones de valores extremos, tales como (1) LEAST y (2) GREATEST, relacionados con KILL_BAD_DATA y un \"CREATE TABLE ... SELECT ....\"" } ], "id": "CVE-2010-3833", "lastModified": "2024-11-21T01:19:42.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:01:15.763", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=55826" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=55826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64845" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51a:*:*:*:*:*:*:*", "matchCriteriaId": "BD39950F-FBBF-4505-8FB5-EEF2886095F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement." }, { "lang": "es", "value": "mysqld en MySQL v5.0.x anteriores a v5.0.88 y v5.1.x anteriores a v5.1.41 no (1) maneja apropiadamente los errores durante la ejecuci\u00f3n de determinadas peticiones SELECT con subpeticiones, y no (2) preserva determinadas \"flags\" (opciones) null_value durante la ejecuci\u00f3n de peticiones que usan la funci\u00f3n GeomFromWKB; lo que permite a usuarios autenticados remotos provocar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a trav\u00e9s de una petici\u00f3n modificada." } ], "id": "CVE-2009-4019", "lastModified": "2024-11-21T01:08:45.153", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-11-30T17:30:00.250", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.mysql.com/47780" }, { "source": "secalert@redhat.com", "url": "http://bugs.mysql.com/48291" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/37717" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/38517" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/38573" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT4077" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2010/dsa-1997" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500" }, { "source": "secalert@redhat.com", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/47780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/48291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125883754215621\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125901161824278\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/37717" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2010/dsa-1997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=540906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00764.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 4.1.13 allows local users to cause a denial of service (persistent replication slave crash) via a query with multiupdate and subselects." }, { "lang": "es", "value": "MySQL anterior a 4.1.13 permite a un usuario local provocar denegaci\u00f3n de servicio (caida de esclavo de replicaci\u00f3n persistente)a trav\u00e9s de una consulta con multiacutalizaciones y subselecciones." } ], "id": "CVE-2006-4380", "lastModified": "2024-11-21T00:15:49.177", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-28T18:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/10442" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.mysql.com/internals/26123" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21712" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21762" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016790" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-1169" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19794" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/10442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.mysql.com/internals/26123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:158" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10686" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los siguientes CVEs: CVE-2012-0112, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485 y CVE-2012-0492." } ], "id": "CVE-2012-0115", "lastModified": "2024-11-21T01:34:25.073", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.647", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0485." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los siguientes CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120 y CVE-2012-0485." } ], "id": "CVE-2012-0492", "lastModified": "2024-11-21T01:35:06.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:07.587", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78393" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/51516" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72537" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.1.5 | |
mysql | mysql | 5.1.23 | |
mysql | mysql | 5.1.32 | |
oracle | mysql | 5.1 | |
oracle | mysql | 5.1.1 | |
oracle | mysql | 5.1.2 | |
oracle | mysql | 5.1.3 | |
oracle | mysql | 5.1.4 | |
oracle | mysql | 5.1.6 | |
oracle | mysql | 5.1.7 | |
oracle | mysql | 5.1.8 | |
oracle | mysql | 5.1.9 | |
oracle | mysql | 5.1.10 | |
oracle | mysql | 5.1.11 | |
oracle | mysql | 5.1.12 | |
oracle | mysql | 5.1.13 | |
oracle | mysql | 5.1.14 | |
oracle | mysql | 5.1.15 | |
oracle | mysql | 5.1.16 | |
oracle | mysql | 5.1.17 | |
oracle | mysql | 5.1.18 | |
oracle | mysql | 5.1.19 | |
oracle | mysql | 5.1.20 | |
oracle | mysql | 5.1.21 | |
oracle | mysql | 5.1.22 | |
oracle | mysql | 5.1.30 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079." }, { "lang": "es", "value": "MySQL v5.1.x anteriores a v5.1.41 permite a usuarios locales evitar ciertas comprobaciones de privilegios invocando CREATE TABLE en una tabla MyISAM con los argumentos (1) DATA DIRECTORY o (2) INDEX DIRECTORY modificados que estan originariamente asociados con pathnames (rutas) sin symlinks, y que pueden apuntar a tables creadas en un futuro en el cual un pathname (ruta) es modificado para contener un symlink a un subdirectorio del directorio home de datos de MySQL. Vulnerabilidad relacionada con una c\u00e1lculo incorrecto del valor mysql_unpacked_real_data_home value. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta al CVE-2008-4098 y CVE-2008-2079." } ], "id": "CVE-2009-4030", "lastModified": "2024-11-21T01:08:46.767", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-11-30T17:30:00.360", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.mysql.com/commits/89940" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/38517" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/38573" }, { "source": "secalert@redhat.com", "url": "http://support.apple.com/kb/HT4077" }, { "source": "secalert@redhat.com", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2010/dsa-1997" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/commits/89940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125908080222685\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2010/dsa-1997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/11/24/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8156" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*", "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*", "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*", "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*", "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*", "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*", "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*", "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*", "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*", "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*", "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*", "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*", "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*", "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*", "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query." } ], "id": "CVE-2006-0903", "lastModified": "2024-11-21T00:07:37.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-02-27T23:02:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html" }, { "source": "secalert@redhat.com", "url": "http://bugs.mysql.com/bug.php?id=17667" }, { "source": "secalert@redhat.com", "url": "http://rst.void.ru/papers/advisory39.txt" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19034" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/19502" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/19814" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20241" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20253" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20333" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20625" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/30351" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1015693" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/16850" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-274-2" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/0752" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915" }, { "source": "secalert@redhat.com", "url": "https://usn.ubuntu.com/274-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=17667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rst.void.ru/papers/advisory39.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/19814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1015693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-274-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24966" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/274-1/" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 2.1 and 3:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=194613\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThis issue has been fixed for Red Hat Enterprise Linux 4 in RHSA-2006:0544.", "lastModified": "2006-09-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/100142 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://openwall.com/lists/oss-security/2017/08/04/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100142 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://mantisbt.org/bugs/view.php?id=23173 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mantisbt:mantisbt:2.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "146401B2-FDE4-4ACC-9CFA-E7BEE11D1FCF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*", "matchCriteriaId": "2177DDD2-8830-4838-9945-0368DBDD1815", "vulnerable": false }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA450156-3EEF-4F22-8F28-2E0A55C81FF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the \u0027admin\u0027 directory (as recommended in the \"Post-installation and upgrade tasks\" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL\u0027s \"connect file read\" feature to remotely access files on the MantisBT server." }, { "lang": "es", "value": "Si tras la correcta instalaci\u00f3n de MantisBT en su versi\u00f3n 2.5.2 en MySQL/MariaDB el administrador no elimina el directorio \"admin\" (tal y como se recomienda en la secci\u00f3n \"Post-installation and upgrade tasks\" de la MantisBT Admin Guide) y el cliente MySQL tiene una configuraci\u00f3n local_infile habilitada (en php.ini mysqli.allow_local_infile o el archivo de configuraci\u00f3n del cliente MySQL, dependiendo de la configuraci\u00f3n de PHP), un atacante podr\u00eda aprovecharse de la funcionalidad \"connect file read\" de MySQL para acceder de forma remota a los archivos del servidor de MantisBT." } ], "id": "CVE-2017-12419", "lastModified": "2024-11-21T03:09:26.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-08-05T15:29:00.177", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100142" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://openwall.com/lists/oss-security/2017/08/04/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://mantisbt.org/bugs/view.php?id=23173" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0118." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la CVE-2012-0118." } ], "id": "CVE-2012-0113", "lastModified": "2024-11-21T01:34:24.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.507", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine\u0027s definer instead of the routine\u0027s caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE." }, { "lang": "es", "value": "MySQL anterior a 5.0.25 y 5.1 anterior a 5.1.12 eval\u00faa los argumentos de rutinas suid en el contexto de seguridad del creador de la rutina en lugar del de aquel que llama a la rutina, lo que permite a usuarios autenticados remotamente escalar privilegios a trav\u00e9s de una rutina que ha sido puesta a su disposici\u00f3n utilizando GRANT EXECUTE." } ], "id": "CVE-2006-4227", "lastModified": "2024-11-21T00:15:26.370", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-18T20:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=18630" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/commits/7918" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21506" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21770" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22080" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016709" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/19559" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=18630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/commits/7918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/19559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10105" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, or 4.\n\nIssue was addressed in MySQL packages as shipped in Red Hat Enterprise Linux 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0364.html", "lastModified": "2008-07-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.0 | |
mysql | mysql | 4.1.3 | |
mysql | mysql | 4.1.10 | |
oracle | mysql | 3.23.49 | |
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.12 | |
oracle | mysql | 4.0.13 | |
oracle | mysql | 4.0.14 | |
oracle | mysql | 4.0.15 | |
oracle | mysql | 4.0.18 | |
oracle | mysql | 4.0.20 | |
oracle | mysql | 4.0.21 | |
oracle | mysql | 4.0.23 | |
oracle | mysql | 4.1.0 | |
oracle | mysql | 4.1.2 | |
oracle | mysql | 4.1.3 | |
oracle | mysql | 4.1.4 | |
oracle | mysql | 4.1.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to bypass library path restrictions and execute arbitrary libraries by using INSERT INTO to modify the mysql.func table, which is processed by the udf_init function." } ], "id": "CVE-2005-0710", "lastModified": "2024-11-20T23:55:44.983", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12781" }, { "source": "secalert@redhat.com", "url": "http://www.trustix.org/errata/2005/0009/" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180" }, { "source": "secalert@redhat.com", "url": "https://usn.ubuntu.com/96-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=111065974004648\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2005/0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/96-1/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*", "matchCriteriaId": "DC81D22D-72FE-4FEC-8277-A994B184B91C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*", "matchCriteriaId": "56225075-5A65-409E-AFC9-CACA381EAC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097." }, { "lang": "es", "value": "MySQL anterior a 5.0.67, permite a usuarios locales evitar determinadas comprobaciones de privilegios haciendo una llamada CREATE TABLE en una tabla MyISAM que modifica los argumentos (1) DATA DIRECTORY o (2) INDEX DIRECTORY que est\u00e1n asociados originalmente con los nombres de ruta (pathname) sin enlaces simb\u00f3licos, y que pueden apuntar a tablas creadas despu\u00e9s de que un nombre de ruta sea modificado para tener un enlace simb\u00f3lico a un subdirectorio del directorio de datos inicial de MySQL. NOTA: esta vulnerabilidad es debida a que no se solucion\u00f3 completamente la vulnerabilidad CVE-2008-4097." } ], "id": "CVE-2008-4098", "lastModified": "2024-11-21T00:50:53.650", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-18T15:04:27.407", "references": [ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32578" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32759" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32769" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38517" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1662" }, { "source": "secalert@redhat.com", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/38517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/09/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2008/09/16/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45649" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10591" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "This issue was addressed in Red Hat Enterprise Linux 4 via https://rhn.redhat.com/errata/RHSA-2010-0110.html and in Red Hat Application Stack v2 via https://rhn.redhat.com/errata/RHSA-2009-1067.html .\n\nIn Red Hat Enterprise Linux 5, issue CVE-2008-2079 was fixed without introducing CVE-2008-4098 in https://rhn.redhat.com/errata/RHSA-2009-1289.html .", "lastModified": "2010-02-17T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite ejecutar c\u00f3digo de su elecci\u00f3n a usuarios remotos autenticados mediante un comando COM_FIELD_LIST con un nombre de tabla larga." } ], "id": "CVE-2010-1850", "lastModified": "2024-11-21T01:15:18.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-06-08T00:30:01.710", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=53237" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1024033" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4435" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=53237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024033" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10846" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6693" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4E9E9D88-6640-45E8-83AA-7B9C0936D905", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink." }, { "lang": "es", "value": "sql/sql_table.cc en MySQL v5.0.x hasta la v5.0.88, v5.1.x hasta la v5.1.41, y v6.0 anteriores a v6.0.9-alpha, cuando el directorio de datos \"home\" contiene un enlace simb\u00f3lico a un sistema de ficheros diferente, permite a usuarios autenticados remotamente saltar las restricciones de acceso implementadas al invocar CREATE TABLE con un argumento (1) DATA DIRECTORY o (2) INDEX DIRECTORY referido a un subdirectorio que requiera el seguimiento de este enlace simb\u00f3lico." } ], "id": "CVE-2008-7247", "lastModified": "2024-11-21T00:58:38.827", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-11-30T17:30:00.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=39277" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://lists.mysql.com/commits/59711" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/38517" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4077" }, { "source": "cve@mitre.org", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/38043" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=39277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.mysql.com/commits/59711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125908040022018\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/38043" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=543619" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 3, 4, or 5.", "lastModified": "2009-12-21T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by creating temporary tables with nullable columns while using InnoDB, which triggers an assertion failure." }, { "lang": "es", "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) mediante la creaci\u00f3n de tablas temporales con columnas que aceptan valores NULL mientras se utiliza InnoDB, que desencadena un fallo de aserci\u00f3n." } ], "id": "CVE-2010-3680", "lastModified": "2024-11-21T01:19:22.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.493", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=54044" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42598" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=54044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64686" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "DC1D0C0F-08EF-4AFA-BBEA-CCDF04F90E05", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "48BA51FF-B163-4522-8D78-AF9C05D50511", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51a:*:*:*:*:*:*:*", "matchCriteriaId": "BD39950F-FBBF-4505-8FB5-EEF2886095F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de formato de cadena en la funci\u00f3n dispatch_command en libmysqld/sql_parse.cc en mysqld de MySQL v4.0.0 hasta v5.0.83 permiten a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (mediante ca\u00edda del demonio) y, posiblemente otros efectos no especificados, a trav\u00e9s de especificadores de formato de cadena en el nombre de base de datos en una petici\u00f3n (1) COM_CREATE_DB o (2) COM_DROP_DB. NOTA: Algunos de estos detalles se obtienen a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2009-2446", "lastModified": "2024-11-21T01:04:53.493", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-07-13T17:30:00.217", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35767" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36566" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/38517" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1022533" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4077" }, { "source": "cve@mitre.org", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55734" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/35609" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/1857" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-07/0058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/38517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1022533" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/55734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/504799/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/35609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/1857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11857" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2446\n\nThis issue was addressed for Red hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html .\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3 and Red Hat Application Stack 2.", "lastModified": "2010-02-17T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql-ocaml | mysql-ocaml | 1.0.4 | |
mysql | mysql | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql-ocaml:mysql-ocaml:1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "CED10CEF-B0EB-4164-9061-EFA0F97497AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA450156-3EEF-4F22-8F28-2E0A55C81FF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mysql-ocaml bindings 1.0.4 for MySQL do not properly support the mysql_real_escape_string function, which might allow remote attackers to leverage escaping issues involving multibyte character encodings." }, { "lang": "es", "value": "El mysql-ocaml bindings v1.0.4 para MySQL no soporta adecuadamente la funci\u00f3n mysql_real_escape_string, lo que puede permitir a atacantes remotos elevar vulnerabilidades de escape incluyendo codificaciones de caracteres multibyte." } ], "id": "CVE-2009-2942", "lastModified": "2024-11-21T01:06:06.920", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-10-22T16:30:00.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37047" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1910" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/59030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/37047" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/59030" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length." }, { "lang": "es", "value": "La funci\u00f3n my_net_skip_rest en sql/net_serv.cc en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (mediante excesivo consumo de CPU y ancho de banda) mediante el env\u00edo de una gran cantidad de paquetes que exceden la longitud m\u00e1xima." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/371.html\r\n\r\n\u0027CWE-371: State Issues\u0027", "id": "CVE-2010-1849", "lastModified": "2024-11-21T01:15:18.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-06-08T00:30:01.663", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/commits/106060" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1024032" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4435" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=50974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/commits/106060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7328" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | * | |
mysql | mysql | * | |
mysql | mysql | * | |
oracle | mysql | * | |
debian | debian_linux | 4.0 | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 7.10 | |
canonical | ubuntu_linux | 8.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "56C895D3-2949-4B14-B059-F0E29D977982", "versionEndExcluding": "4.1.24", "versionStartIncluding": "4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "027481EF-83CF-40AF-8223-572B7915845F", "versionEndExcluding": "5.0.60", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F5416CD-0CEB-4C41-AE28-2A9C2B5600A7", "versionEndExcluding": "5.1.24", "versionStartIncluding": "5.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA6A87CA-DA11-4B91-A3E9-6437042BDC1A", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*", "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future." }, { "lang": "es", "value": "MySQL 4.1.x anterior a 4.1.24, 5.0.x antes de 5.0.60, 5.1.x anterior a 5.1.24 y 6.0.x antes de 6.0.5 permite a usuarios locales evitar ciertas comprobaciones de privilegios llamando a CREATE TABLE en una tabla MyISAM con argumentos (1) DATA DIRECTORY or (2) INDEX DIRECTORY modificados que est\u00e1n dentro del directorio MySQL home data, que puede apuntar a tablas que se crear\u00e1n en el futuro." } ], "evaluatorComment": "Per http://www.securityfocus.com/bid/29106 and http://secunia.com/advisories/32222, this vulnerability is remotely exploitable.", "id": "CVE-2008-2079", "lastModified": "2024-11-21T00:46:02.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-05-05T16:20:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30134" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31066" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31226" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31687" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32222" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32769" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36566" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36701" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3865" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1608" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29106" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019995" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1472/references" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=32167" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-60.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-5.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0505.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0510.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/29106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1019995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1472/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10133" } ], "sourceIdentifier": "secalert@redhat.com", "vendorComments": [ { "comment": "This issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3.\n\nThis issue was addressed for Red Hat Enterprise Linux 4, 5, and Red Hat Application Stack v1, v2:\nhttps://rhn.redhat.com/cve/CVE-2008-2079.html\n", "lastModified": "2009-09-02T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement." }, { "lang": "es", "value": "MySQL anterior a 5.1.18 permite a usuarios autenticados remotamente sin privilegios SELECT obtener informaci\u00f3n sensible desde tablas particionadas mediante una sentencia ALTER TABLE." } ], "id": "CVE-2007-2693", "lastModified": "2024-11-21T00:31:25.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T01:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=23675" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/25301" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24008" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018071" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=23675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/25301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34349" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. These issues did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", "lastModified": "2007-06-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message." } ], "id": "CVE-2006-1517", "lastModified": "2024-11-21T00:09:04.820", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-05-05T12:46:00.000", "references": [ { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "source": "security@debian.org", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "security@debian.org", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "security@debian.org", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20002" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20073" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20076" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20223" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20241" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20253" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20333" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20424" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20457" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20625" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20762" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/24479" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/29847" }, { "source": "security@debian.org", "url": "http://securityreason.com/securityalert/839" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016016" }, { "source": "security@debian.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "source": "security@debian.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "security@debian.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "source": "security@debian.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "source": "security@debian.org", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "source": "security@debian.org", "url": "http://www.osvdb.org/25228" }, { "source": "security@debian.org", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/17780" }, { "source": "security@debian.org", "url": "http://www.trustix.org/errata/2006/0028" }, { "source": "security@debian.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "source": "security@debian.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228" }, { "source": "security@debian.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036" }, { "source": "security@debian.org", "url": "https://usn.ubuntu.com/283-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/25228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2006/0028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/283-1/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0101." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x y v5.1.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a los CVEs: CVE-2012-0087 y CVE-2012-0101." } ], "id": "CVE-2012-0102", "lastModified": "2024-11-21T01:34:23.590", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.037", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78379" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72521" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "E78D5A70-ADE3-4F81-A8EF-5379DB54434C", "versionEndIncluding": "5.1.60", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A36F82C-6EBF-497B-9C20-AFB2007AA684", "versionEndIncluding": "5.5.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.60 and earlier, and 5.5.19 and earlier, allows remote authenticated users to affect availability, related to MyISAM." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server en Oracle MySQL v5.1.60 y anteriores, y v5.5.19 y anteriores, que permite a usuarios remotos autenticados afectar la disponibilidad, relacionado con MyISAM." } ], "id": "CVE-2012-0583", "lastModified": "2024-11-21T01:35:18.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-03T22:55:02.123", "references": [ { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48890" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/49179" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/53061" }, { "source": "secalert_us@oracle.com", "url": "http://www.securitytracker.com/id?1026934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53061" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026934" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | * | |
mysql | mysql | * | |
mysql | mysql | * | |
debian | debian_linux | 3.1 | |
debian | debian_linux | 4.0 | |
canonical | ubuntu_linux | 6.06 | |
canonical | ubuntu_linux | 6.10 | |
canonical | ubuntu_linux | 7.04 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEF6DC-B3F3-4022-8EA8-954DC7190DCB", "versionEndIncluding": "4.1.22", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "16C0994F-0692-448D-A0FB-93C05760E5D5", "versionEndExcluding": "5.0.42", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "5624BDD4-657E-4E27-8DE2-EA15028C21D6", "versionEndExcluding": "5.1.18", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables." }, { "lang": "es", "value": "MySQL anterior a 4.1.23, 5.0.x anterior a 5.0.42, y 5.1.x anterior a 5.1.18 no requiere el privilegio DROP para sentencias RENAME TABLE, lo cual permite a usuarios autenticados remotamente renombrar tablas de su elecci\u00f3n." } ], "evaluatorSolution": "The vendor has released a product update to address this issue:\r\nUpgrade to MySQL version 5.1.18: http://dev.mysql.com/downloads/", "id": "CVE-2007-2691", "lastModified": "2024-11-21T00:31:25.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T01:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=27515" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/announce/470" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://osvdb.org/34766" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/25301" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/25946" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/26073" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/26430" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27155" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27823" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31226" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32222" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/24016" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1018069" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://issues.rpath.com/browse/RPL-1536" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/528-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=27515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/announce/470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://osvdb.org/34766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/25301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/25946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/26073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/26430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/27823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/31226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/32222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2007/dsa-1413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/24016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1018069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34347" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://issues.rpath.com/browse/RPL-1536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/528-1/" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-2691\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n", "lastModified": "2007-05-29T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing \"alternate reads from two indexes on a table,\" which triggers an assertion failure." }, { "lang": "es", "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.5 anteriores a 5.5.5, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) mediante la interfaz HANDLER y realizar \"alternate reads from two indexes on a table\", lo que desencadena un fallo de aserci\u00f3n." } ], "id": "CVE-2010-3681", "lastModified": "2024-11-21T01:19:22.833", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.557", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54007" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42633" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64685" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect confidentiality via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad de los datos a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-0484", "lastModified": "2024-11-21T01:35:05.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:07.087", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78372" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/51515" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51515" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72525" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*", "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*", "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*", "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*", "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*", "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*", "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*", "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*", "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*", "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*", "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*", "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*", "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*", "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*", "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user\u0027s privileges are revoked for the original table, which might violate intended security policy." }, { "lang": "es", "value": "MySQL 4.1 anterior a 4.1.21 y 5.0 anterior a 5.0.24 permite a usuarios locales acceder a una tabla a trav\u00e9s de una tabla MERGE previamente creada, incluso despu\u00e9s de que los privilegios del usuario han sido revocados para la tabla original, lo cual podr\u00eda violar la pol\u00edtica de seguridad pretendida." } ], "evaluatorSolution": "This vulnerability is addressed in the following product releases:\r\nMySQL, MySQL, 4.1.21 \r\nMySQL, MySQL, 5.0.24", "id": "CVE-2006-4031", "lastModified": "2024-11-21T00:14:58.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-09T22:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21259" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21382" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21627" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21685" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21770" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22080" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24479" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30351" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/31226" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016617" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19279" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-568" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=15195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21259" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/31226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/19279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-338-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10468" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue was corrected in all affected mysql packages versions as shipped in Red Hat Enterprise Linux or Red Hat Application Stack via:\n\nhttps://rhn.redhat.com/errata/CVE-2006-4031.html\n\nThis issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1 or 3", "lastModified": "2008-07-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier, probably triggering a use-after-free error when a copied object is modified in a way that also affects the original object." }, { "lang": "es", "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permiten a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de una declaraci\u00f3n preparada que utiliza GROUP_CONCAT con el modificador WITH ROLLUP, probablemente provocando un error de uso despu\u00e9s de liberaci\u00f3n un objeto copiado es modificado, de tal manera que tambi\u00e9n afecta al objeto original." } ], "id": "CVE-2010-3837", "lastModified": "2024-11-21T01:19:43.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:43.437", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54476" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64841" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0101 and CVE-2012-0102." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x y v5.1.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la de los CVEs: CVE-2012-0101 y CVE-2012-0102." } ], "id": "CVE-2012-0087", "lastModified": "2024-11-21T01:34:21.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:05.273", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78377" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/51509" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72519" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://marc.info/?l=bugtraq&m=108904917528205&w=2 | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/184030 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=108904917528205&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/184030 | Patch, Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string." }, { "lang": "es", "value": "La funci\u00f3n check_scramble_323 de MySQL 4.1x anteriores a 4.1.4, y 5.0, permite a atacantes remotos saltarse la autenticaci\u00f3n mediente una cadena revuelta de longitud cero." } ], "id": "CVE-2004-0627", "lastModified": "2024-11-20T23:49:00.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-06T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/184030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/184030" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.0 | |
mysql | mysql | 4.1.3 | |
mysql | mysql | 4.1.10 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.12 | |
oracle | mysql | 4.0.13 | |
oracle | mysql | 4.0.14 | |
oracle | mysql | 4.0.15 | |
oracle | mysql | 4.0.18 | |
oracle | mysql | 4.0.20 | |
oracle | mysql | 4.0.21 | |
oracle | mysql | 4.0.24 | |
oracle | mysql | 4.1.0 | |
oracle | mysql | 4.1.2 | |
oracle | mysql | 4.1.3 | |
oracle | mysql | 4.1.4 | |
oracle | mysql | 4.1.5 | |
oracle | mysql | 5.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field." } ], "id": "CVE-2005-2558", "lastModified": "2024-11-20T23:59:50.070", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17027" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/20381" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29847" }, { "source": "cve@mitre.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-829" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-831" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2005/dsa-833" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14509" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737" }, { "source": "cve@mitre.org", "url": "https://www.ubuntu.com/usn/usn-180-1/" }, { "source": "cve@mitre.org", "url": "https://www.ubuntu.com/usn/usn-180-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112354450412427\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-829" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-831" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2005/dsa-833" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2005_21_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/14509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.ubuntu.com/usn/usn-180-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.ubuntu.com/usn/usn-180-2/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "749E313A-CD07-40DA-97D6-58F53D62231B", "versionEndIncluding": "5.0.87", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library." }, { "lang": "es", "value": "La funci\u00f3n vio_verify_callback en vio_verify_callback de MySQL v5.0.x anteriores a v5.0.88 y v5.1.x anteriores a v5.1.41, cuando utiliza OpenSSL, acepta un valor cero para la profundidad de los certificados X.509, permitiendo a atacantes de hombre en medio (man-in-the-middle) suplantar servidores MySQL de su elecci\u00f3n basados en SSL mediante un certificado creado espec\u00edficamente, como se ha demostrado por un certificado presentado por un servidor vinculado con la biblioteca yaSSL." } ], "id": "CVE-2009-4028", "lastModified": "2024-11-21T01:08:46.520", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-11-30T17:30:00.327", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.mysql.com/47320" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://lists.mysql.com/commits/87446" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/47320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-88.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-41.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://lists.mysql.com/commits/87446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=oss-security\u0026m=125881733826437\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/11/19/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2009/11/23/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0109.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10940" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8510" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via certain arguments to the BINLOG command, which triggers an access of uninitialized memory, as demonstrated by valgrind." }, { "lang": "es", "value": "Oracle MySQL 5.1 ersiones anteriores a la 5.1.49 permite a los usuarios autenticados remotos provocar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) a trav\u00e9s de ciertos argumentos al comando BINLOG, que desencadena un acceso a la memoria no inicializada, como lo demuestra valgrind." } ], "id": "CVE-2010-3679", "lastModified": "2024-11-21T01:19:22.480", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.447", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54393" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42638" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64687" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0120, CVE-2012-0485 y CVE-2012-0492." } ], "id": "CVE-2012-0119", "lastModified": "2024-11-21T01:34:25.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.947", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485, and CVE-2012-0492." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los siguientes CVEs: CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, CVE-2012-0485 y CVE-2012-0492." } ], "id": "CVE-2012-0112", "lastModified": "2024-11-21T01:34:24.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.447", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
oracle | mysql | 5.0.0 | |
oracle | mysql | 5.0.3 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.7 | |
oracle | mysql | 5.0.8 | |
oracle | mysql | 5.0.9 | |
oracle | mysql | 5.0.11 | |
oracle | mysql | 5.0.12 | |
oracle | mysql | 5.0.13 | |
oracle | mysql | 5.0.14 | |
oracle | mysql | 5.0.18 | |
oracle | mysql | 5.0.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values." } ], "id": "CVE-2006-1518", "lastModified": "2024-11-21T00:09:04.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-05-05T12:46:00.000", "references": [ { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "source": "security@debian.org", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20241" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20253" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20333" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20457" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20762" }, { "source": "security@debian.org", "url": "http://securityreason.com/securityalert/839" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016016" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "security@debian.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/602457" }, { "source": "security@debian.org", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/17780" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "source": "security@debian.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016016" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/602457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/432734/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.wisec.it/vulns.php?page=8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26232" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "3983147C-7775-4FBC-85B1-E33DB1EDD669", "versionEndIncluding": "5.1.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "1092CB84-5263-49AF-A9E3-D36FA2A699A3", "versionEndIncluding": "5.0.91", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3D740-E7E8-4E4E-BA75-899015500396", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*", "matchCriteriaId": "6421D8E6-6769-400E-A7EA-DA683F637F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*", "matchCriteriaId": "533421DF-D468-4E83-B27D-612778735F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*", "matchCriteriaId": "1F307DFE-D497-4494-91FF-B056E70C71A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*", "matchCriteriaId": "FFF392C0-4042-4E91-890F-71C0C05AAB56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*", "matchCriteriaId": "8462FC32-D6C8-448C-992F-F13C63D163BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*", "matchCriteriaId": "5B91B6CB-624D-429C-86CD-28CBA1A8AD0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*", "matchCriteriaId": "E1DFB3DB-FBD9-4542-82B9-C7EA603135EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*", "matchCriteriaId": "7A77E76D-1CE4-446C-9F2D-18913BE0F4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*", "matchCriteriaId": "D01C656F-C7CE-4625-9C7C-A160291E327F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*", "matchCriteriaId": "4AB3A560-CAC3-4173-BA24-A00E85A10C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "F9F17925-3F60-4DA8-86D6-596AC8A7466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*", "matchCriteriaId": "FF9B3CCC-7FE4-48FA-8DC6-F508999E9406", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F1CDDF-D1ED-4A9A-A34F-757C2B8FD4EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*", "matchCriteriaId": "0E20D59E-D30F-4FCD-B3E7-69BA102E434A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*", "matchCriteriaId": "DA8DC8BB-6339-4FF7-A334-DE0DDE3FB3B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function." }, { "lang": "es", "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.0 anteriores a 5.0.92, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) mediante el uso de EXPLAIN con declaraciones especialmente dise\u00f1adas \"SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)\", que desencadena una desreferencia de puntero NULL en la funci\u00f3n Item_singlerow_subselect::store." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027CWE-476: NULL Pointer Dereference\u0027", "id": "CVE-2010-3682", "lastModified": "2024-11-21T01:19:23.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.603", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=52711" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42599" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=52711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64684" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request." }, { "lang": "es", "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.5 anteriores a 5.5.5, env\u00eda un paquete OK cuando una petici\u00f3n LOAD DATA INFILE genera errores SQL, lo que permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio mysqld) por medio de una petici\u00f3n especialmente dise\u00f1ada." } ], "id": "CVE-2010-3683", "lastModified": "2024-11-21T01:19:23.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=52512" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42625" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=52512" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-5.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64683" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect integrity via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la integridad de los datos a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-0075", "lastModified": "2024-11-21T01:34:20.470", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:M/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.2, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:04.490", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78374" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/51526" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72539" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.0 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
mysql | mysql | 5.1.5 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.7 | |
oracle | mysql | 5.0.8 | |
oracle | mysql | 5.0.9 | |
oracle | mysql | 5.0.11 | |
oracle | mysql | 5.0.12 | |
oracle | mysql | 5.0.13 | |
oracle | mysql | 5.0.14 | |
oracle | mysql | 5.0.18 | |
oracle | mysql | 5.0.19 | |
oracle | mysql | 5.0.21 | |
oracle | mysql | 5.0.22 | |
oracle | mysql | 5.1.1 | |
oracle | mysql | 5.1.2 | |
oracle | mysql | 5.1.3 | |
oracle | mysql | 5.1.4 | |
oracle | mysql | 5.1.6 | |
oracle | mysql | 5.1.7 | |
oracle | mysql | 5.1.8 | |
oracle | mysql | 5.1.9 | |
oracle | mysql | 5.1.10 | |
oracle | mysql | 5.1.11 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability" }, { "lang": "es", "value": "** IMPUGNADA ** Desbordamiento de b\u00fafer por superaci\u00f3n del l\u00edmite en la funci\u00f3n Instance_options::complete_initialization de instance_options.cc en el Instance Manager de MySQL antes de 5.0.23 y 5.1 antes de 5.1.12 podr\u00eda permitir a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) mediante vectores sin especificar, lo que dispara el desbordamiento cuando se llama a la funci\u00f3n convert_dirname. NOTA: el fabricante ha impugnado este problema por email a CVE, diciendo que solamente es explotable cuando el usuario tiene acceso al archivo de configuraci\u00f3n o al demonio Instance Manager. Debido a su funcionalidad prevista, este nivel de acceso ya permitir\u00eda al usuario interrumpir la operaci\u00f3n del programa, por lo cual esto no transpasa los l\u00edmites de seguridad y no es una vulnerabilidad." } ], "id": "CVE-2006-3486", "lastModified": "2024-11-21T00:13:43.533", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-10T21:05:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=20622" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2700" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=20622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-12.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/2700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27635" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "We do not consider this issue to have security implications, and therefore have no plans to issue MySQL updates for Red Hat Enterprise Linux 2.1, 3, or 4 to correct this issue.", "lastModified": "2006-07-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en MySQL v5.0 hasta v5.0.91 y v5.1 anteriores a v5.1.47 permite a usuarios autenticados remotamente saltarse tablas establecidas permitiendo leer definiciones de campos de tablas de su elecci\u00f3n, y sobre v5.1 leer o eliminar contenido de tablas de su elecci\u00f3n, a trav\u00e9s de .. (punto punto) en un nombre de tabla." } ], "id": "CVE-2010-1848", "lastModified": "2024-11-21T01:15:18.690", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-06-08T00:30:01.630", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=53371" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/commits/107532" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1024031" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4435" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=53371" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/commits/107532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4435" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:107" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.0 | |
mysql | mysql | 4.1.2 | |
mysql | mysql | 4.1.3 | |
mysql | mysql | 4.1.8 | |
mysql | mysql | 4.1.10 | |
mysql | mysql | 4.1.12 | |
mysql | mysql | 4.1.13 | |
mysql | mysql | 4.1.14 | |
mysql | mysql | 4.1.15 | |
mysql | mysql | 5.0.0 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
oracle | mysql | 4.1.1 | |
oracle | mysql | 4.1.4 | |
oracle | mysql | 4.1.5 | |
oracle | mysql | 4.1.6 | |
oracle | mysql | 4.1.7 | |
oracle | mysql | 4.1.9 | |
oracle | mysql | 4.1.11 | |
oracle | mysql | 4.1.16 | |
oracle | mysql | 4.1.17 | |
oracle | mysql | 4.1.18 | |
oracle | mysql | 4.1.19 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.7 | |
oracle | mysql | 5.0.8 | |
oracle | mysql | 5.0.9 | |
oracle | mysql | 5.0.11 | |
oracle | mysql | 5.0.12 | |
oracle | mysql | 5.0.13 | |
oracle | mysql | 5.0.14 | |
oracle | mysql | 5.0.18 | |
oracle | mysql | 5.0.19 | |
oracle | mysql | 5.0.21 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input." } ], "id": "CVE-2006-2753", "lastModified": "2024-11-21T00:11:59.670", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-01T17:02:00.000", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735" }, { "source": "secalert@redhat.com", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://lists.mysql.com/announce/364" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20365" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20489" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20531" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20541" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20562" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20625" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/20712" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/24479" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1016216" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2006/dsa-1092" }, { "source": "secalert@redhat.com", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/18219" }, { "source": "secalert@redhat.com", "url": "http://www.trustix.org/errata/2006/0034/" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/usn-288-3" }, { "source": "secalert@redhat.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2006/2105" }, { "source": "secalert@redhat.com", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312" }, { "source": "secalert@redhat.com", "url": "https://usn.ubuntu.com/303-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.mysql.com/announce/364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20489" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1092" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:097" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/18219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2006/0034/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-288-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/303-1/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*", "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*", "matchCriteriaId": "4E268D9E-0C18-4257-8820-634B7357BEE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:*", "matchCriteriaId": "0942892C-2106-4F1F-AEBE-78C1CF55E363", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C87CE-8BA5-4701-B295-7672AF52E6B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*", "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*", "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*", "matchCriteriaId": "97045EB4-F22C-4694-BFB2-C1EA72705206", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6246-988E-4259-8BAF-4F104ED12936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*", "matchCriteriaId": "C34D221E-E9D9-4A1D-B3BC-CB66456D004B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*", "matchCriteriaId": "3FF95406-DAA6-4164-95CE-F88F19C8DE24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*", "matchCriteriaId": "65EF36A4-EC77-46FA-B9E9-24B8DBC71BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "7D9F2E70-A2F5-432F-A04C-B5811C1A23E8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote attackers to affect availability via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a atacantes remotos afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2011-2262", "lastModified": "2024-11-21T01:27:54.677", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:02.977", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en yaSSL, como se usa en MySQL v5.5.20 y posiblemente otras versiones incluidas v5.5.x antes de v5.5.22 y y 5.1.x antes de v5.1.62, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados, seg\u00fan lo demostrado por VulnDisco Paquete Profesional v9.17. NOTA: a partir de 20120224, esta revelaci\u00f3n no tiene informaci\u00f3n procesable. Sin embargo, debido a que el autor del m\u00f3dulo es un investigador confiable, se ha asignado un identificador CVE al tema con fines de seguimiento. NOTA: debido a la falta de informaci\u00f3n, no est\u00e1 claro si este tema es un duplicado de CVE-2012-0492 CVE u otro." } ], "id": "CVE-2012-0882", "lastModified": "2024-11-21T01:35:54.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-12-21T05:46:15.120", "references": [ { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141" }, { "source": "secalert@redhat.com", "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html" }, { "source": "secalert@redhat.com", "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/02/24/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0882buffer_overflow_vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.immunityinc.com/pipermail/canvas/2012-February/000014.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions." }, { "lang": "es", "value": "MySQL anteriores a 4.1.21, 5.0 anterior a 5.0.25, y 5.1 anteriores a 5.1.12, cuando se ejecutan en sistemas de fichero sensibles al uso de may\u00fasculas o min\u00fascular, permite a usuarios autenticados remotamente crear o acceder a una base de datos cuando el nombre de la base de datos difiere s\u00f3lo en el uso de may\u00fasculas y min\u00fasculas de una base de datos para la cual tienen permisos." } ], "evaluatorSolution": "Successful exploitation requires that MySQL runs on a system with a file system supporting case-sensitive file names.\r\nThis vulnerability is addresses in the following product releases: \r\nMySQL, MySQL, 4.1.21\r\nMySQL, MySQL, 5.0.25\r\nMySQL, MySQL, 5.1.12", "id": "CVE-2006-4226", "lastModified": "2024-11-21T00:15:26.157", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-08-18T20:04:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=17647" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.mysql.com/commits/5927" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21506" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21627" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/21762" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/22080" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24479" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24744" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1016710" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-1169" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "source": "cve@mitre.org", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/19559" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=17647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-25.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.mysql.com/commits/5927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/21506" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/21762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/22080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1016710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006_23_sr.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0152.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/19559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/3306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/28448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10729" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=203426\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here:\nhttp://www.redhat.com/security/updates/classification/\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3", "lastModified": "2006-09-19T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://bugs.gentoo.org/630822 | Issue Tracking, Third Party Advisory | |
cve@mitre.org | https://security.gentoo.org/glsa/201711-04 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugs.gentoo.org/630822 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201711-04 | Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mariadb:mariadb:*:r1:*:*:*:*:*:*", "matchCriteriaId": "1666B9B6-FF52-479D-85D3-8750BDF4387A", "versionEndExcluding": "10.0.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:r1:*:*:*:*:*:*", "matchCriteriaId": "AFB191C0-7262-43E1-A28A-102EA7DAD55B", "versionEndExcluding": "5.6.36", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:*", "matchCriteriaId": "92121D8A-529E-454A-BC8D-B6E0017E615D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link." }, { "lang": "es", "value": "Los scripts de instalaci\u00f3n en los paquetes dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster y dev-db/mariadb-galera de Gento en versiones anteriores a 2017-09-29 tiene llamadas chown para \u00e1rboles de directorios modificables por los usuarios, lo que puede permitir que los usuarios locales obtengan privilegios aprovechando el acceso a la cuenta mysql para la creaci\u00f3n de un enlace." } ], "id": "CVE-2017-15945", "lastModified": "2024-11-21T03:15:30.547", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-10-27T21:29:00.310", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/630822" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201711-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.gentoo.org/630822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201711-04" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4BB16B9-9AE0-4A7A-B284-80F81D941462", "versionEndIncluding": "5.1.45", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command." }, { "lang": "es", "value": "La funci\u00f3n mysql_uninstall_plugin en sql/sql_plugin.cc en MySQL en versiones anteriores a la 5.1.46 no comprueba los privilegios antes de desinstalar un plugin, lo que puede permitir a atacantes remotos desinstalar plugins de su elecci\u00f3n mediante el comando UNINSTALL PLUGIN." } ], "id": "CVE-2010-1621", "lastModified": "2024-11-21T01:14:49.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-05-14T19:30:01.453", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.mysql.com/bug.php?id=51770" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/39543" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=51770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-46.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:093" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/39543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4BB16B9-9AE0-4A7A-B284-80F81D941462", "versionEndIncluding": "5.1.45", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL before 5.1.46 allows local users to delete the data and index files of another user\u0027s MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247." }, { "lang": "es", "value": "MySQL en versiones anteriores a la v5.1.46 permite a los usuarios locales borrar los datos e \u00edndices de ficheros de tablas MyISAM de otros usuarios a trav\u00e9s de un ataque de enlace simb\u00f3lico junto con un comando DROP TABLE, una vulnerabilidad diferente a la CVE-2008-4098 y CVE-2008-7247." } ], "id": "CVE-2010-1626", "lastModified": "2024-11-21T01:14:50.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-05-21T17:30:01.490", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=40980" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "secalert@redhat.com", "url": "http://securitytracker.com/id?1024004" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/40257" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1194" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=40980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1024004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/10/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2010/05/18/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0442.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/40257" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2010/1194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9490" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" }, { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120, and CVE-2012-0492." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120 y CVE-2012-0492." } ], "id": "CVE-2012-0485", "lastModified": "2024-11-21T01:35:05.420", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:07.133", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78383" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/51513" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72526" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (mysqld server crash) by performing a user-variable assignment in a logical expression that is calculated and stored in a temporary table for GROUP BY, then causing the expression value to be used after the table is created, which causes the expression to be re-evaluated instead of accessing its value from the table." }, { "lang": "es", "value": "MySQL versiones 5.1 anteriores a 5.1.51 y versiones 5.5 anteriores a 5.5.6, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del servidor mysqld) mediante la realizaci\u00f3n de una asignaci\u00f3n de variable de usuario en una expresi\u00f3n l\u00f3gica que se calcula y almacena en una tabla temporal para GROUP BY y, entonces causar que sea usado el valor de la expresi\u00f3n despu\u00e9s de crear la tabla, lo que causa que la expresi\u00f3n se vuelva a evaluar en lugar de tener acceso a su valor desde la tabla." } ], "id": "CVE-2010-3835", "lastModified": "2024-11-21T01:19:42.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:42.983", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=55564" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=55564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64843" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "3983147C-7775-4FBC-85B1-E33DB1EDD669", "versionEndIncluding": "5.1.48", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "1092CB84-5263-49AF-A9E3-D36FA2A699A3", "versionEndIncluding": "5.0.91", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.72:*:*:*:*:*:*:*", "matchCriteriaId": "1AE3D740-E7E8-4E4E-BA75-899015500396", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.74:*:*:*:*:*:*:*", "matchCriteriaId": "6421D8E6-6769-400E-A7EA-DA683F637F49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:a:*:*:*:*:*:*", "matchCriteriaId": "533421DF-D468-4E83-B27D-612778735F8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:b:*:*:*:*:*:*", "matchCriteriaId": "1F307DFE-D497-4494-91FF-B056E70C71A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:a:*:*:*:*:*:*", "matchCriteriaId": "FFF392C0-4042-4E91-890F-71C0C05AAB56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.68:*:*:*:*:*:*:*", "matchCriteriaId": "8462FC32-D6C8-448C-992F-F13C63D163BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.70:*:*:*:*:*:*:*", "matchCriteriaId": "5B91B6CB-624D-429C-86CD-28CBA1A8AD0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.72:sp1:*:*:*:*:*:*", "matchCriteriaId": "E1DFB3DB-FBD9-4542-82B9-C7EA603135EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.74:sp1:*:*:*:*:*:*", "matchCriteriaId": "7A77E76D-1CE4-446C-9F2D-18913BE0F4B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.76:*:*:*:*:*:*:*", "matchCriteriaId": "D01C656F-C7CE-4625-9C7C-A160291E327F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.78:*:*:*:*:*:*:*", "matchCriteriaId": "4AB3A560-CAC3-4173-BA24-A00E85A10C62", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.79:*:*:*:*:*:*:*", "matchCriteriaId": "F9F17925-3F60-4DA8-86D6-596AC8A7466D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.80:*:*:*:*:*:*:*", "matchCriteriaId": "FF9B3CCC-7FE4-48FA-8DC6-F508999E9406", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.82:sp1:*:*:*:*:*:*", "matchCriteriaId": "18F1CDDF-D1ED-4A9A-A34F-757C2B8FD4EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.84:sp1:*:*:*:*:*:*", "matchCriteriaId": "0E20D59E-D30F-4FCD-B3E7-69BA102E434A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.87:sp1:*:*:*:*:*:*", "matchCriteriaId": "DA8DC8BB-6339-4FF7-A334-DE0DDE3FB3B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column." }, { "lang": "es", "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49 y versiones 5.0 anteriores a 5.0.92, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio de mysqld) por medio de una consulta join que utiliza una tabla con una columna SET \u00fanica." } ], "id": "CVE-2010-3677", "lastModified": "2024-11-21T01:19:22.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.323", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=54575" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42646" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=54575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64688" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*", "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*", "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file." }, { "lang": "es", "value": "mysqlbug de MySQL pemite a usuarios locales sobreescribir ficheros elgidos arbitrariamente mediante un ataque de enlaces simb\u00f3licos sobre el fichero temporal failed-mysql-bugreport" } ], "id": "CVE-2004-0381", "lastModified": "2024-11-20T23:48:27.587", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-05-04T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-483" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9976" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108023246916294\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108206802810402\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200405-20.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-569.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/9976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15617" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11557" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.0 | |
mysql | mysql | 4.1.3 | |
mysql | mysql | 4.1.10 | |
oracle | mysql | 3.23.49 | |
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.12 | |
oracle | mysql | 4.0.13 | |
oracle | mysql | 4.0.14 | |
oracle | mysql | 4.0.15 | |
oracle | mysql | 4.0.18 | |
oracle | mysql | 4.0.20 | |
oracle | mysql | 4.0.21 | |
oracle | mysql | 4.0.23 | |
oracle | mysql | 4.1.0 | |
oracle | mysql | 4.1.2 | |
oracle | mysql | 4.1.3 | |
oracle | mysql | 4.1.4 | |
oracle | mysql | 4.1.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack." } ], "id": "CVE-2005-0711", "lastModified": "2024-11-20T23:55:45.103", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-02T04:00:00.000", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "secalert@redhat.com", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "secalert@redhat.com", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "source": "secalert@redhat.com", "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12781" }, { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "source": "secalert@redhat.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591" }, { "source": "secalert@redhat.com", "url": "https://usn.ubuntu.com/96-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0082.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.debian.org/security/2005/dsa-707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.novell.com/linux/security/advisories/2005_19_mysql.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-334.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-348.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/12781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.trustix.org/errata/2005/0009/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/96-1/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | Patch, Vendor Advisory | |
cve@mitre.org | http://marc.info/?l=bugtraq&m=108904917528205&w=2 | ||
cve@mitre.org | http://www.kb.cert.org/vuls/id/645326 | Patch, Third Party Advisory, US Government Resource | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/16612 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=108904917528205&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/645326 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/16612 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string." }, { "lang": "es", "value": "Desbordamiento basado en la pila en MySQL 4.1.x anteriores a 4.1.3, y 5.0 permite a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante una cadena de permutaci\u00f3n (scramble)." } ], "id": "CVE-2004-0628", "lastModified": "2024-11-20T23:49:01.017", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-06T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/645326" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=108904917528205\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/645326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16612" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.30 | |
mysql | mysql | 5.0.36 | |
mysql | mysql | 5.0.44 | |
oracle | mysql | 5.0.26 | |
oracle | mysql | 5.0.27 | |
oracle | mysql | 5.0.30 | |
oracle | mysql | 5.0.32 | |
oracle | mysql | 5.0.33 | |
oracle | mysql | 5.0.37 | |
oracle | mysql | 5.0.38 | |
oracle | mysql | 5.0.41 | |
oracle | mysql | 5.0.42 | |
oracle | mysql | 5.0.45 | |
oracle | mysql | 5.0.67 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document. NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el cliente command-line en MySQL v5.0.26 a la v5.0.45, cuando la opci\u00f3n --html est\u00e1 activa, permite a los atacantes inyectar web script o HTML de su elecci\u00f3n coloc\u00e1ndolo en una celda de la base de datos, a la que puede acceder el cliente al comoponer un documento HTML." } ], "id": "CVE-2008-4456", "lastModified": "2024-11-21T00:51:43.277", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-10-06T23:25:50.707", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=27884" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/bugtraq/2008/Oct/0026.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32072" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34907" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36566" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38517" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/4357" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4077" }, { "source": "cve@mitre.org", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1783" }, { "source": "cve@mitre.org", "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/31486" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=27884" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/bugtraq/2008/Oct/0026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/38517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/4357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://ubuntu.com/usn/usn-897-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496842/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/496877/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497158/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/497885/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/31486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45590" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11456" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-4456\n\nThis issue was addressed for Red Hat Enterprise Linux 5 by https://rhn.redhat.com/errata/RHSA-2009-1289.html and Red Hat Enterprise Linux 4 by https://rhn.redhat.com/errata/RHSA-2010-0110.html .\n\nThe Red Hat Security Response Team has rated this issue as having low security impact, future MySQL package updates may address this flaw for Red Hat Enterprise Linux 3, and Red Hat Application Stack 2.", "lastModified": "2010-02-17T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | * | |
mysql | mysql | 5.0.0 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
mysql | mysql | 5.0.24 | |
mysql | mysql | 5.0.30 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.7 | |
oracle | mysql | 5.0.32 | |
oracle | mysql | 5.0.41 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "E13E69DD-CFBF-4AC5-BD1D-FD6B3DD4B365", "versionEndIncluding": "5.0.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function." }, { "lang": "es", "value": "MySQL versi\u00f3n 5.x anterior a 5.0.36, permite a los usuarios locales causar una denegaci\u00f3n de servicio (bloqueo de base de datos) al realizar subselecciones de la tabla information_schema y utilizar ORDER BY para ordenar un resultado de una sola fila, lo que impide que determinados elementos de la estructura se inicialicen y desencadene una desreferencia de NULL en la funci\u00f3n filesort." } ], "id": "CVE-2007-1420", "lastModified": "2024-11-21T00:28:16.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-03-12T23:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=24630" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24483" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24609" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25196" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25389" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25946" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2413" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.sec-consult.com/284.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/22900" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1017746" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-440-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0908" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1127" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=24630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-36.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24483" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200705-11.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.sec-consult.com/284.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/462339/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.securityfocus.com/bid/22900" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1017746" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-440-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9530" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, and 4.\n\nIssue was addressed in mysql packages as shipped in Red Hat Enterprise Linux 5 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0364.html", "lastModified": "2008-07-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier." }, { "lang": "es", "value": "MySQL de Oracle versiones 5.1 anteriores a 5.1.49, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de operaciones (1) IN o (2) CASE con argumentos NULL que son especificados expl\u00edcitamente o indirectamente proporcionados por el modificador WITH ROLLUP." } ], "id": "CVE-2010-3678", "lastModified": "2024-11-21T01:19:22.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.387", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54477" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42596" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628172" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y la integridad de los datos a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-0116", "lastModified": "2024-11-21T01:34:25.200", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.727", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and availability via unknown vectors, a different vulnerability than CVE-2012-0113." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente de MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la CVE-2012-0113." } ], "id": "CVE-2012-0118", "lastModified": "2024-11-21T01:34:25.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.867", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read." } ], "id": "CVE-2006-1516", "lastModified": "2024-11-21T00:09:04.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-05-05T12:46:00.000", "references": [ { "source": "security@debian.org", "url": "http://bugs.debian.org/365938" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "source": "security@debian.org", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "security@debian.org", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "security@debian.org", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "source": "security@debian.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20002" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20073" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20076" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20223" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20241" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20253" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20333" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20424" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20457" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20625" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/20762" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/24479" }, { "source": "security@debian.org", "url": "http://secunia.com/advisories/29847" }, { "source": "security@debian.org", "url": "http://securityreason.com/securityalert/840" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016017" }, { "source": "security@debian.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "source": "security@debian.org", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "security@debian.org", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "security@debian.org", "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "source": "security@debian.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "source": "security@debian.org", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "source": "security@debian.org", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "source": "security@debian.org", "url": "http://www.securityfocus.com/bid/17780" }, { "source": "security@debian.org", "url": "http://www.trustix.org/errata/2006/0028" }, { "source": "security@debian.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "security@debian.org", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "source": "security@debian.org", "tags": [ "Patch" ], "url": "http://www.wisec.it/vulns.php?page=7" }, { "source": "security@debian.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236" }, { "source": "security@debian.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918" }, { "source": "security@debian.org", "url": "https://usn.ubuntu.com/283-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/365938" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20457" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/20762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1016017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.599377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-13.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.novell.com/linux/security/advisories/2006-06-02.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2006-0544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/432733/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/434164/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/17780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.trustix.org/errata/2006/0028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/1633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/1326/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.wisec.it/vulns.php?page=7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/283-1/" } ], "sourceIdentifier": "security@debian.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:o:conectiva:linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "97177EF7-8FC4-4D4D-A8D9-3628AA0035FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "CD14661C-E3BE-44DF-BC8D-294322BF23EA", "vulnerable": true }, { "criteria": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4007B0D-9606-46BD-866A-7911BEA292BE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en get_salt_from_password de sql_acl.cc de MySQL 4.0.14 y anteriores, y 3.23.x, permite a atacantes ejecutar c\u00f3digo arbitrario mediante un campo de contrase\u00f1a largo." } ], "id": "CVE-2003-0780", "lastModified": "2024-11-20T23:45:30.510", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-09-22T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/9709" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-381" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/516492" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/337012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000743" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=106364207129993\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=106381424420775\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/9709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2003/dsa-381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/516492" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-281.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-282.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/archive/1/337012" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.0 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.5.0.21 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
mysql | mysql | 5.0.22.1.0.1 | |
mysql | mysql | 5.0.24 | |
oracle | mysql | 5.0.41 | |
oracle | mysql | 5.1.1 | |
oracle | mysql | 5.1.2 | |
oracle | mysql | 5.1.10 | |
oracle | mysql | 5.1.11 | |
oracle | mysql | 5.1.12 | |
oracle | mysql | 5.1.13 | |
oracle | mysql | 5.1.14 | |
oracle | mysql | 5.1.15 | |
oracle | mysql | 5.1.16 | |
oracle | mysql | 5.1.17 | |
oracle | mysql | 6.0.0 | |
oracle | mysql | 6.0.1 | |
oracle | mysql | 6.0.2 | |
oracle | mysql | 6.0.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement." }, { "lang": "es", "value": "MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, no actualizan el valor DEFINER de una vista cuando se modifica la vista, lo que permite a usuarios remotos autenticados alcanzar privilegios por medio de una secuencia de sentencias, incluyendo una sentencia CREATE SQL SECURITY DEFINER VIEW y una sentencia ALTER VIEW." } ], "id": "CVE-2007-6303", "lastModified": "2024-11-21T00:39:49.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-12-10T21:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=29908" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/announce/502" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28025" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28063" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28739" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29443" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29706" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019085" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26832" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-2187" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=29908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/announce/502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38989" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect the mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3, 4, or 5.\n\nThis issue affected the mysql packages as shipped in Red Hat Application Stack v1 and v2 and was addressed by RHSA-2007:1157:\nhttp://rhn.redhat.com/errata/RHSA-2007-1157.html", "lastModified": "2008-01-09T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A64B25C-DF8F-46BC-BA7A-8A93A6230192", "versionEndIncluding": "5.1.23_bk", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error." }, { "lang": "es", "value": "La funci\u00f3n convert_search_mode_to_innobase del ha_innodb.cc en el motor InnoDB del 5.1.23-BK y versiones anteriores permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (ca\u00edda de la base de datos) a trav\u00e9s de ciertas operaciones CONTAINS sobre un \u00edndice de una columna, lo que dispara una afirmaci\u00f3n de error." } ], "id": "CVE-2007-5925", "lastModified": "2024-11-21T00:38:57.603", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-10T02:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988" }, { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=32125" }, { "source": "cve@mitre.org", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27568" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27649" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27823" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28025" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28040" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28099" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28108" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28128" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26353" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018978" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3903" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/559-1/" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.gentoo.org/show_bug.cgi?id=198988" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=32125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27649" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200711-25.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26353" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11390" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/559-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "78D57F50-6907-4F3A-B6C8-A7F96191E57C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA549DB-8870-41C2-881A-018C1FA66A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "85C4F943-4457-43CB-BCD4-89A593446877", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1F9345D2-DFFC-4932-B967-996363D5556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A950B554-660F-474E-A0E0-55EAE4CF0ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0E77E350-47C9-4286-8B2E-2021974F2AE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "BB79AEDA-C256-4B5C-953F-5C8BFFF80612", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D6F573E-B1E5-4AB3-BEA7-130EF8AD51C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "62D4CC90-D892-4E1D-A6D7-9A50FAF9466C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D211EF2D-AF05-441E-8C6C-7F3CB4AFC417", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "2A79BEFA-B205-4C94-9575-EB970823B935", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "16939E17-0791-4B50-A6E1-4A2FF3C02109", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "0D39E098-FBFC-42EC-835B-AB487807D176", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "902F6029-CB42-4A3B-9D9B-4F5134871685", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "7428EF7D-3ECA-4C54-A945-AD03CA3EEA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "798A89AA-4CD7-4402-9B14-B45970022C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "879DEFCF-B345-41ED-8A2E-531FBD7A2FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8313D34E-CE00-4B0B-B30F-9E2591BD515A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0E05202-0E64-4698-970A-DCF665E0E9A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "4C85219E-C93F-4DCC-9507-AD6B00CAD687", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "DC835BFC-8AE7-4A01-99C1-C7EFDBFA8A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A022751-FE6D-4C5D-AB02-22C44D7E6B1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "BB22F327-7795-4B25-B40E-5684F2A5B0BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A36F82C-6EBF-497B-9C20-AFB2007AA684", "versionEndIncluding": "5.5.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "578BA199-EF04-4595-AFDE-54FD66B7FC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*", "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*", "matchCriteriaId": "B82E464F-3871-40C7-A758-B81582D193AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*", "matchCriteriaId": "05B7E2C5-6139-47F9-A310-F2BC0EF83942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*", "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*", "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*", "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*", "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*", "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*", "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*", "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*", "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*", "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*", "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*", "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*", "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*", "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*", "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*", "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "48BA51FF-B163-4522-8D78-AF9C05D50511", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_connector\\/j:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3FBF02F4-97EE-4300-A7F4-033D190788F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente de servidor MySQL en Oracle MySQL v5.5.19 y anteriores permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con el Optimizador de servidor." } ], "id": "CVE-2012-1696", "lastModified": "2024-11-21T01:37:28.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-03T22:55:02.637", "references": [ { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48890" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/49179" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/53071" }, { "source": "secalert_us@oracle.com", "url": "http://www.securitytracker.com/id?1026934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026934" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 5.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file\u0027s contents." } ], "id": "CVE-2005-1636", "lastModified": "2024-11-20T23:57:47.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-05-17T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/15369" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/17080" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/13660" }, { "source": "cve@mitre.org", "url": "http://www.zataz.net/adviso/mysql-05172005.txt" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=full-disclosure\u0026m=111632686805498\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/15369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/17080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2005-685.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/13660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zataz.net/adviso/mysql-05172005.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9504" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*", "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*", "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*", "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.1.x before 5.1.63 and 5.5.x before 5.5.24 allows remote authenticated users to cause a denial of service (mysqld crash) via vectors related to incorrect calculation and a sort order index." }, { "lang": "es", "value": "MySQL v5.1.x antes de v5.1.63 y v5.5.x antes de v5.5.24 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda de mysqld) a trav\u00e9s de vectores relacionados con un c\u00e1lculo incorrecto y un \u00edndice de orden de clasificaci\u00f3n.\r\n" } ], "id": "CVE-2012-2749", "lastModified": "2024-11-21T01:39:34.033", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-17T00:55:03.517", "references": [ { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/51309" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/55120" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-63.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1462.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0180.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/51309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/55120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=833737" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.1.x before 5.1.62 and 5.5.x before 5.5.22 allows remote authenticated users to cause a denial of service (assertion failure and mysqld abort) by deleting a record and using HANDLER READ NEXT." }, { "lang": "es", "value": "MySQL v5.1.x antes de v5.1.62 y v5.5.x antes de v5.5.22 permite a usuarios remotos autenticados provocar una denegaci\u00f3n de servicio (error de aserci\u00f3n y parada no ordenada de mysqld) mediante la supresi\u00f3n de un registro y usando \u0027HANDLER READ NEXT\u0027.\r\n" } ], "id": "CVE-2012-2102", "lastModified": "2024-11-21T01:38:29.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-17T00:55:03.000", "references": [ { "source": "secalert@redhat.com", "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/52931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bazaar.launchpad.net/~mysql/mysql-server/5.5/revision/3097.15.15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-62.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-22.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://eromang.zataz.com/2012/04/10/oracle-mysql-innodb-bugs-13510739-and-63775-dos-demo/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/04/13/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/52931" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E11538C-D2F9-4D94-8C84-69BDC305D744", "versionEndIncluding": "1.7.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "matchCriteriaId": "FB92A552-079E-4A5E-B65E-8A6C956FC7DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "matchCriteriaId": "9A5CD839-1C18-44F2-836F-97B85572D491", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "matchCriteriaId": "4BA355E8-593E-470C-B565-60CD51B14C3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "matchCriteriaId": "7AF30535-45D3-4845-8B7C-16F7B6D05F63", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "matchCriteriaId": "87BAAF59-A8F5-46AB-9CAC-E0F76B47D942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "matchCriteriaId": "60540719-8329-47E4-820F-8B4E4AA55AF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "matchCriteriaId": "7147148B-BD26-4280-9B3F-1B27551E0CAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*", "matchCriteriaId": "DC81D22D-72FE-4FEC-8277-A994B184B91C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "matchCriteriaId": "B15A96B9-3982-49DF-A836-1DBC3FD29EF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "matchCriteriaId": "A02DEBB1-65A5-4422-8B75-E8C86EA0B947", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*", "matchCriteriaId": "56225075-5A65-409E-AFC9-CACA381EAC29", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "matchCriteriaId": "AFB11E34-4045-4ACA-AD7D-48B70D13CD92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "matchCriteriaId": "6D2FC440-4D06-4CE2-BE20-A46EB196182F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "matchCriteriaId": "455E364E-5010-47D9-8F09-58FE4B15615B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "10082781-B93E-4B84-94F2-FA9749B4D92B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "matchCriteriaId": "823BF8BE-2309-4F67-A5E2-EAD98F723468", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en yaSSL 1.7.5 y anteriores, como el utilizado en MySQL y posiblemente otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante (1) la funci\u00f3n ProcessOldClientHello en handshake.cpp o (2) \"input_buffer\u0026 operator\u003e\u003e\" en yassl_imp.cpp." } ], "id": "CVE-2008-0226", "lastModified": "2024-11-21T00:41:26.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-01-10T23:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://bugs.mysql.com/33814" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/28324" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/28419" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/28597" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/29443" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32222" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3531" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1478" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27140" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429" }, { "source": "cve@mitre.org", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://bugs.mysql.com/33814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/28324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/28419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/28597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/29443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://secunia.com/advisories/32222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2008/dsa-1478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27140" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, 4, 5, Red Hat Application Stack v1, and v2, as they are not built with yaSSL support.", "lastModified": "2008-01-11T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.8 | |
mysql | mysql | 4.1.12 | |
mysql | mysql | 4.1.13 | |
mysql | mysql | 4.1.14 | |
mysql | mysql | 4.1.15 | |
mysql | mysql | 5.0.5.0.21 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
oracle | mysql | 4.1.6 | |
oracle | mysql | 4.1.7 | |
oracle | mysql | 4.1.9 | |
oracle | mysql | 4.1.11 | |
oracle | mysql | 4.1.16 | |
oracle | mysql | 4.1.18 | |
oracle | mysql | 4.1.19 | |
oracle | mysql | 4.1.20 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.9 | |
oracle | mysql | 5.0.11 | |
oracle | mysql | 5.0.12 | |
oracle | mysql | 5.0.13 | |
oracle | mysql | 5.0.18 | |
oracle | mysql | 5.0.19 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message." }, { "lang": "es", "value": "Vulnerabilidad de cadena de formato en time.cc de MySQL Server 4.1 anterior a 4.1.21 y 5.0 anterior al 1 de abril de 2006 permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (ca\u00edda) mediante una cadena de formato en lugar de una fecha como el primer par\u00e1metro para la funci\u00f3n date_format, la cual es posteriormente utilizada en una llamada de escritura formateada para mostrar el mensaje de error." } ], "id": "CVE-2006-3469", "lastModified": "2024-11-21T00:13:41.040", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-07-21T14:03:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694" }, { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=20729" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21147" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21366" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24479" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31226" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/19032" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-321-1" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=375694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=20729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-21.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21147" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/21366" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200608-09.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2006/dsa-1112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0768.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/19032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-321-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9827" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue was addressed in mysql packages as shipped in Red Hat Enterprise Linux 4 via:\n\nhttps://rhn.redhat.com/errata/RHSA-2008-0768.html\n\nThis issue did not affect mysql packages as shipped with Red Hat Enterprise Linux 2.1, 3, or 5, and Red Hat Application Stack v1 and v2.", "lastModified": "2008-07-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E0733B-5C1C-4579-9FD2-251E45E8D93F", "versionEndExcluding": "3.23.49", "versionStartIncluding": "3.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9CB33C2-B487-4DC3-A7F4-4A9D61EA12FD", "versionEndExcluding": "4.0.21", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 4.x before 4.0.21, and 3.x before 3.23.49, allows attackers to cause a denial of service (crash or hang) via multiple threads that simultaneously alter MERGE table UNIONs." }, { "lang": "es", "value": "MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 permiten a atacantes causar una denegaci\u00f3n de servicio (ca\u00edda o cuelgue) mediante m\u00faltiples hilos de ejecuci\u00f3n que alter\u00e1n simultaneamente UNIONes de tablas MERGE." } ], "id": "CVE-2004-0837", "lastModified": "2024-11-20T23:49:31.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-03T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/2408" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16168" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16173" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16174" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/11357" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/2408" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/16174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=110140517515735\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mysql.bkbits.net:8080/mysql-3.23/diffs/myisammrg/myrg_open.c%401.15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/11357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17667" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*", "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*", "matchCriteriaId": "4E268D9E-0C18-4257-8820-634B7357BEE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:*", "matchCriteriaId": "0942892C-2106-4F1F-AEBE-78C1CF55E363", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C87CE-8BA5-4701-B295-7672AF52E6B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.66:*:*:*:*:*:*:*", "matchCriteriaId": "4EABA08A-81F1-46ED-BF57-FA63229DDCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.67:*:*:*:*:*:*:*", "matchCriteriaId": "5FD6AA9F-7F35-4522-B396-C2179ED9B490", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*", "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*", "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*", "matchCriteriaId": "97045EB4-F22C-4694-BFB2-C1EA72705206", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6246-988E-4259-8BAF-4F104ED12936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*", "matchCriteriaId": "C34D221E-E9D9-4A1D-B3BC-CB66456D004B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*", "matchCriteriaId": "3FF95406-DAA6-4164-95CE-F88F19C8DE24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*", "matchCriteriaId": "65EF36A4-EC77-46FA-B9E9-24B8DBC71BE2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.28, has unspecified impact and attack vectors, a different vulnerability than CVE-2013-1492." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en yaSSL, usado en MySQL v5.1.x antes de v5.1.68 y v5.5.x antes de v5.5.28, tiene un impacto no especificado y vectores de ataque, una vulnerabilidad diferente a CVE-2013-1492." } ], "id": "CVE-2012-0553", "lastModified": "2024-11-21T01:35:13.880", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-28T23:55:01.237", "references": [ { "source": "secalert_us@oracle.com", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52445" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2012_0553_buffer_overflow" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (server crash) via a query that uses the (1) GREATEST or (2) LEAST function with a mixed list of numeric and LONGBLOB arguments, which is not properly handled when the function\u0027s result is \"processed using an intermediate temporary table.\"" }, { "lang": "es", "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por ca\u00edda del servidor) a trav\u00e9s de una consulta que utiliza el las funciones (1) GREATEST o (2) LEAST con una lista de argumentos num\u00e9ricos y LONGBLOB, que no son correctamente manipulados cuando el resultado de la funci\u00f3n es procesado utilizando una tabla temporal intermedia." } ], "id": "CVE-2010-3838", "lastModified": "2024-11-21T01:19:43.537", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:43.560", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=54461" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=54461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64840" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b\u0027\u0027 (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement." }, { "lang": "es", "value": "MySQL versiones 5.0 anteriores a 5.0.66, versiones 5.1 anteriores a 5.1.26 y versiones 6.0 anteriores a 6.0.6, no maneja apropiadamente un token b\u0027\u0027 (b comilla simple comilla simple), tambi\u00e9n se conoce como literal de cadena de bits vac\u00eda, que permite a los atacantes remotos causar una denegaci\u00f3n de servicio (bloqueo del demonio) mediante el uso de este token en una sentencia SQL." } ], "id": "CVE-2008-3963", "lastModified": "2024-11-21T00:50:35.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-09-11T01:13:47.617", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=35658" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31769" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32759" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/32769" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34907" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/36566" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1783" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1020858" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2554" }, { "source": "cve@mitre.org", "url": "https://bugs.gentoo.org/237166" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=35658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-66.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-26.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/31769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/32769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/36566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.debian.org/security/2009/dsa-1783" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/09/09/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/09/09/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-1289.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1020858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-671-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.gentoo.org/237166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10521" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect MySQL as supplied with Red Hat Enterprise Linux 3 or 4.\n\nThis issue was addressed for Red Hat Enterprise Linux 5 and Red Hat Application Stack v2\nhttps://rhn.redhat.com/cve/CVE-2008-3963.html", "lastModified": "2009-09-02T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:*", "matchCriteriaId": "5AF9060C-9469-48DA-858A-BB42E77AF88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:*", "matchCriteriaId": "4E268D9E-0C18-4257-8820-634B7357BEE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:*", "matchCriteriaId": "0942892C-2106-4F1F-AEBE-78C1CF55E363", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.65:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C87CE-8BA5-4701-B295-7672AF52E6B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.66:*:*:*:*:*:*:*", "matchCriteriaId": "4EABA08A-81F1-46ED-BF57-FA63229DDCE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.67:*:*:*:*:*:*:*", "matchCriteriaId": "5FD6AA9F-7F35-4522-B396-C2179ED9B490", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:*", "matchCriteriaId": "54047553-C08F-474C-8650-89AAAC68056B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:*", "matchCriteriaId": "41EE02F4-02F7-49A3-AFCA-C20BA2AF65C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:*", "matchCriteriaId": "97045EB4-F22C-4694-BFB2-C1EA72705206", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:*", "matchCriteriaId": "88DC6246-988E-4259-8BAF-4F104ED12936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:*", "matchCriteriaId": "C34D221E-E9D9-4A1D-B3BC-CB66456D004B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:*", "matchCriteriaId": "3FF95406-DAA6-4164-95CE-F88F19C8DE24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:*", "matchCriteriaId": "65EF36A4-EC77-46FA-B9E9-24B8DBC71BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:*", "matchCriteriaId": "7D9F2E70-A2F5-432F-A04C-B5811C1A23E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:*", "matchCriteriaId": "A2F018DB-4AC3-4FF4-8B9B-1107F81C25F8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in yaSSL, as used in MySQL 5.1.x before 5.1.68 and 5.5.x before 5.5.30, has unspecified impact and attack vectors, a different vulnerability than CVE-2012-0553." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en yaSSL, como se usa en MySQL v5.1.x hasta 5.1.68 y en v5.5.x antes de v5.5.30, tiene un impacto no especificado y vectores de ataque, una vulnerabilidad diferente a CVE-2012-0553." } ], "id": "CVE-2013-1492", "lastModified": "2024-11-21T01:49:43.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-03-28T23:55:01.663", "references": [ { "source": "secalert_us@oracle.com", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "source": "secalert_us@oracle.com", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52445" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.1/en/news-5-1-68.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-30.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/52445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_1492_buffer_overflow" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 4.1.0 | |
mysql | mysql | 4.1.3 | |
mysql | mysql | 4.1.10 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
oracle | mysql | 4.0.0 | |
oracle | mysql | 4.0.1 | |
oracle | mysql | 4.0.2 | |
oracle | mysql | 4.0.3 | |
oracle | mysql | 4.0.4 | |
oracle | mysql | 4.0.5 | |
oracle | mysql | 4.0.5a | |
oracle | mysql | 4.0.6 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.7 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.8 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.9 | |
oracle | mysql | 4.0.10 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.11 | |
oracle | mysql | 4.0.12 | |
oracle | mysql | 4.0.13 | |
oracle | mysql | 4.0.14 | |
oracle | mysql | 4.0.15 | |
oracle | mysql | 4.0.18 | |
oracle | mysql | 4.0.20 | |
oracle | mysql | 4.0.21 | |
oracle | mysql | 4.0.24 | |
oracle | mysql | 4.1.0 | |
oracle | mysql | 4.1.2 | |
oracle | mysql | 4.1.3 | |
oracle | mysql | 4.1.4 | |
oracle | mysql | 4.1.5 | |
oracle | mysql | 5.0.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\\) character." } ], "id": "CVE-2005-2573", "lastModified": "2024-11-20T23:59:52.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2005-08-16T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA" }, { "source": "cve@mitre.org", "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=112360618320729\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.appsecinc.com/resources/alerts/mysql/2005-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21738" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | * | |
mysql | mysql | 5.1.23 | |
mysql | mysql | 5.1.31 | |
mysql | mysql | 6.0.9 | |
mysql | mysql | 6.0.10-bzr | |
oracle | mysql | 5.1 | |
oracle | mysql | 5.1.1 | |
oracle | mysql | 5.1.2 | |
oracle | mysql | 5.1.3 | |
oracle | mysql | 5.1.10 | |
oracle | mysql | 5.1.11 | |
oracle | mysql | 5.1.12 | |
oracle | mysql | 5.1.13 | |
oracle | mysql | 5.1.14 | |
oracle | mysql | 5.1.15 | |
oracle | mysql | 5.1.16 | |
oracle | mysql | 5.1.17 | |
oracle | mysql | 5.1.18 | |
oracle | mysql | 5.1.19 | |
oracle | mysql | 5.1.20 | |
oracle | mysql | 5.1.21 | |
oracle | mysql | 5.1.22 | |
oracle | mysql | 5.1.23 | |
oracle | mysql | 5.1.24 | |
oracle | mysql | 5.1.25 | |
oracle | mysql | 5.1.26 | |
oracle | mysql | 5.1.27 | |
oracle | mysql | 5.1.28 | |
oracle | mysql | 5.1.29 | |
oracle | mysql | 5.1.30 | |
oracle | mysql | 5.1.31 | |
oracle | mysql | 6.0.0 | |
oracle | mysql | 6.0.1 | |
oracle | mysql | 6.0.2 | |
oracle | mysql | 6.0.3 | |
oracle | mysql | 6.0.4 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AE37831-9813-4488-AD83-A23DD5729EA9", "versionEndIncluding": "5.1.32-bzr", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:6.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4E9E9D88-6640-45E8-83AA-7B9C0936D905", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:6.0.10-bzr:*:*:*:*:*:*:*", "matchCriteriaId": "4433A47E-0AF5-474B-8C68-E6B470CEBC16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "81592813-78D9-4366-AD2E-94677D93F599", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" which triggers an assertion failure." }, { "lang": "es", "value": "El archivo sql/item_xmlfunc.cc en MySQL versiones 5.1 anteriores a 5.1.32 y versiones 6.0 anteriores a 6.0.10, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo) por medio de \"an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML(),\" que desencadena un fallo de aserci\u00f3n." } ], "id": "CVE-2009-0819", "lastModified": "2024-11-21T01:00:59.043", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-03-05T02:30:00.657", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=42495" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34115" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/33972" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021786" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0594" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=42495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-32.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-10.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/33972" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021786" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49050" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7544" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. This issue did not affect the versions of mysql packages, as shipped with Red Hat Enterprise Linux 3, 4, or 5, and Red Hat Application Stack v2.", "lastModified": "2009-10-21T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.0 before 5.0.92, 5.1 before 5.1.51, and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (assertion failure and server crash) via vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers." }, { "lang": "es", "value": "MySQL v5.0 antes de v5.0.92, v5.1 antes de v5.1.51, y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por un error de aserci\u00f3n y consiguiente ca\u00edda del servidor) a trav\u00e9s de vectores relacionados con la preparaci\u00f3n de una vista, pre-evaluaci\u00f3n de predicados LIKE, y Optimizadores IN." } ], "id": "CVE-2010-3836", "lastModified": "2024-11-21T01:19:43.187", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:43.187", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54568" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT4723" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=54568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-92.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT4723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640845" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64842" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x, 5.1.x, and 5.5.x allows remote authenticated users to affect availability via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en componente MySQL Server de Oracle MySQL v5.0.x, v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2012-0490", "lastModified": "2024-11-21T01:35:06.053", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:07.430", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78388" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/51524" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78388" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51524" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72531" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "823AD411-0A49-4EAA-AABF-C8705CE18AF9", "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA5A3321-CF65-4B5E-90E3-DAC9CFD19BB3", "versionEndIncluding": "5.0.1", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "7882B594-DC91-4F85-A450-9F43872F3BC7", "versionEndExcluding": "3.23.59", "versionStartExcluding": "3.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "373C3F5C-56D1-4DDA-A8C4-E2DC3E164B44", "versionEndExcluding": "4.0.19", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities." }, { "lang": "es", "value": "MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 comprueban los derechos CREATE/INSERT de la tabla original en lugar de los de la tabla de destino en una operaci\u00f3n ALTER TABLE RANAME, lo que podr\u00eda permitir a atacantes realizar actividades no permitidas." } ], "id": "CVE-2004-0835", "lastModified": "2024-11-20T23:49:31.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-11-03T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=3270" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/13073" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11357" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://bugs.mysql.com/bug.php?id=3270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000892" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.mysql.com/internals/13073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/12783/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1011606" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.ciac.org/ciac/bulletins/p-018.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.debian.org/security/2004/dsa-562" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-200410-22.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-0-19.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.mysql.org/doc/refman/4.1/en/news-4-1-2.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-597.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/11357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.trustix.org/errata/2004/0054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17666" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments." }, { "lang": "es", "value": "La caracter\u00edstica de comentarios ejecutables en MySQL v5.0.x antes de v5.0.93 y v5.1.x antes de v5.1.50, cuando se ejecuta con ciertas configuraciones de esclavos en la que el esclavo est\u00e1 ejecutando una versi\u00f3n m\u00e1s reciente que el maestro, permite a atacantes remotos ejecutar comandos SQL a trav\u00e9s de comentarios personalizados.\r\n" } ], "id": "CVE-2009-5026", "lastModified": "2024-11-21T01:11:01.083", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-17T00:55:01.470", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=49124" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html" }, { "source": "secalert@redhat.com", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert@redhat.com", "url": "http://seclists.org/oss-sec/2011/q4/101" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49179" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=49124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/news-5-0-93.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-50.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/oss-sec/2011/q4/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640177" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 5.1 before 5.1.51 and 5.5 before 5.5.6 allows remote authenticated users to cause a denial of service (infinite loop) via multiple invocations of a (1) prepared statement or (2) stored procedure that creates a query with nested JOIN statements." }, { "lang": "es", "value": "MySQL v5.1 antes de v5.1.51 y v5.5 antes de v5.5.6 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (por un bucle infinito) a trav\u00e9s de varias invocaciones de (1) un procedimiento preparado o (2) un procedimiento almacenado que crea una consulta con JOINs anidados ." } ], "id": "CVE-2010-3839", "lastModified": "2024-11-21T01:19:43.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:44.280", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=53544" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=53544" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.5/en/news-5-5-6.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640861" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64839" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.0 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.5.0.21 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
mysql | mysql | 5.0.22.1.0.1 | |
mysql | mysql | 5.0.24 | |
oracle | mysql | 5.0.0 | |
oracle | mysql | 5.0.3 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.7 | |
oracle | mysql | 5.0.8 | |
oracle | mysql | 5.0.9 | |
oracle | mysql | 5.0.11 | |
oracle | mysql | 5.0.12 | |
oracle | mysql | 5.0.13 | |
oracle | mysql | 5.0.14 | |
oracle | mysql | 5.0.18 | |
oracle | mysql | 5.0.19 | |
oracle | mysql | 5.0.21 | |
oracle | mysql | 5.0.22 | |
oracle | mysql | 5.0.27 | |
oracle | mysql | 5.0.33 | |
oracle | mysql | 5.0.37 | |
oracle | mysql | 5.0.41 | |
oracle | mysql | 5.1.1 | |
oracle | mysql | 5.1.2 | |
oracle | mysql | 5.1.10 | |
oracle | mysql | 5.1.11 | |
oracle | mysql | 5.1.12 | |
oracle | mysql | 5.1.13 | |
oracle | mysql | 5.1.14 | |
oracle | mysql | 5.1.15 | |
oracle | mysql | 5.1.16 | |
oracle | mysql | 5.1.17 | |
oracle | mysql | 6.0.0 | |
oracle | mysql | 6.0.1 | |
oracle | mysql | 6.0.2 | |
oracle | mysql | 6.0.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F48E7355-2D9A-454D-AE66-B0AE015E31A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E51BF67A-BAEC-48F8-9290-67C6C5B8442E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "1F5C6A2F-DEAE-470D-8888-0E9076CCA0B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C09231E-8759-4DFB-AA8D-17A1C6D43AC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns." }, { "lang": "es", "value": "El motor federated en MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, al realizar una determinada consulta SHOW TABLE STATUS, permite a los servidores MySQL remotos causar una denegaci\u00f3n de servicio (bloqueo del manejador de federated y bloqueo del demonio) por medio de una respuesta que carece del n\u00famero m\u00ednimo necesario de columnas." } ], "id": "CVE-2007-6304", "lastModified": "2024-11-21T00:39:49.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-12-10T21:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=29801" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/announce/502" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/42609" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28063" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28128" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28343" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28637" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28739" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29706" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1019085" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1451" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26832" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-2187" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/559-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=29801" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/announce/502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/42609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28739" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1019085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:017" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/487606/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-2187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/559-1/" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "Not vulnerable. The MySQL versions as shipped in Red Hat Enterprise Linux 2.1, 3, and 4 do not support federated storage engine. The MySQL package as shipped in Red Hat Enterprise Linux 5, Red Hat Application Stack v1, and Red Hat Application Stack v2 are not compiled with support for federated storage engine.", "lastModified": "2007-12-14T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "matchCriteriaId": "BEF9271A-A816-44F6-A811-ECC1FB0993C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "matchCriteriaId": "F482D3D3-205C-495E-AF3A-E9C3018111F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "53853D65-F2C6-410F-9CF8-DED19B66BD4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45:b:*:*:*:*:*:*", "matchCriteriaId": "7F8AFD18-8FA4-4A5F-A504-28D4F16DC3F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.45b:*:*:*:*:*:*:*", "matchCriteriaId": "9A439745-2C5C-4AD1-AC41-35168806F780", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "matchCriteriaId": "D927706B-565F-4152-8F86-AC85F1AA469F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "matchCriteriaId": "8C0291F7-27D9-4634-9DD3-21827C1CC5ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "matchCriteriaId": "35D54A38-E7A0-4B89-BBA5-D98D4D7FF3DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AFEB8-711B-4DED-A24E-38012F415FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.82:*:*:*:*:*:*:*", "matchCriteriaId": "9369CF20-D05C-41A2-8F9E-DE259FCF9E1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.84:*:*:*:*:*:*:*", "matchCriteriaId": "34DDFA0E-91D5-4B4C-8BB7-58B663D7F94F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.87:*:*:*:*:*:*:*", "matchCriteriaId": "8CBB79BC-E3DD-439F-A19C-A8CA70942EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "AA586E2B-A349-47C8-A17C-DA9016C6C3B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C30CA14C-AE28-4D9A-B53D-B7C28D3BA56B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "811780EA-8805-41A6-A920-A201CCC80790", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "matchCriteriaId": "A7753CE5-61C4-4FBC-BB60-F7D4493E76E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "matchCriteriaId": "7EDC2EB4-2C8D-4EF7-83A6-CBE6FF759DD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "matchCriteriaId": "B54F660F-AE43-4F3B-8935-5712CAE860A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "matchCriteriaId": "8B49F9BA-560B-40AE-9457-436830CDD371", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "F53A8437-C61A-4203-B341-B5596569E50B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "A1435669-9BDA-40D4-BB30-C8AE1C3E7649", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "matchCriteriaId": "A8EBAE3C-F24D-4935-96BF-9541EC03B8F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "matchCriteriaId": "EA95EE27-389A-4068-AAC1-AD64DD6BB006", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.67:*:*:*:*:*:*:*", "matchCriteriaId": "C98C5EFF-B629-4FFF-B535-0C25DADD1C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.75:*:*:*:*:*:*:*", "matchCriteriaId": "2FA3E354-4366-46B5-ACD2-E72D0C8320A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.77:*:*:*:*:*:*:*", "matchCriteriaId": "0C002047-0FB1-4DC6-9108-B4B5AAFAC16A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.81:*:*:*:*:*:*:*", "matchCriteriaId": "584C0690-2826-4389-95AD-42048AEE1916", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.83:*:*:*:*:*:*:*", "matchCriteriaId": "0CB85180-0F28-4281-BB59-E3F29BE25C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.85:*:*:*:*:*:*:*", "matchCriteriaId": "2E96AD6D-3AC1-4232-B0A9-C31E1BF6B169", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.86:*:*:*:*:*:*:*", "matchCriteriaId": "565E57C0-B6B9-4868-8907-B436E5D5C56F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.88:*:*:*:*:*:*:*", "matchCriteriaId": "1A53D5E1-70FE-4816-B919-C6CCC4D93F56", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.89:*:*:*:*:*:*:*", "matchCriteriaId": "5539B564-D3BD-4E25-A65F-57187C9DAC59", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.90:*:*:*:*:*:*:*", "matchCriteriaId": "77E5871A-25F8-4EE6-B286-142F3A6222F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.91:*:*:*:*:*:*:*", "matchCriteriaId": "FA1024DA-7B19-4EC0-AD21-C521B14C44B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.92:*:*:*:*:*:*:*", "matchCriteriaId": "9AF610AF-08E3-4F19-9091-B2A516B829F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0D3A47F8-CD7E-4E08-929C-8DD274CAC162", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.94:*:*:*:*:*:*:*", "matchCriteriaId": "37A1B433-1969-4DD4-BA6A-0FE8DDC3BD77", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.0.x and 5.1.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0087 and CVE-2012-0102." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.0.x y v5.1.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a la de los CVEs: CVE-2012-0087 y CVE-2012-0102." } ], "id": "CVE-2012-0101", "lastModified": "2024-11-21T01:34:23.453", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:05.990", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "secalert_us@oracle.com", "url": "http://osvdb.org/78378" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "secalert_us@oracle.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72520" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*", "matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect availability via unknown vectors, a different vulnerability than CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485, and CVE-2012-0492." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la disponibilidad de los datos a trav\u00e9s de vectores desconocidos. Se trata de una vulnerabilidad diferente a las de los CVEs: CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0485 y CVE-2012-0492." } ], "id": "CVE-2012-0120", "lastModified": "2024-11-21T01:34:25.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-01-18T22:55:06.990", "references": [ { "source": "secalert_us@oracle.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48250" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function." }, { "lang": "es", "value": "mysqld en MySQL v4.1.x antes de v4.1.18, v5.0.x antes de v5.0.19, y v5.1.x antes de v5.1.6 permite causar una denegaci\u00f3n de servicio (ca\u00edda del demonio) a usuarios remotos autorizados a trav\u00e9s de un segundo argumento nulo para la funci\u00f3n STR_TO_DATE." } ], "id": "CVE-2006-3081", "lastModified": "2024-11-21T00:12:46.580", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-19T18:02:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "source": "cve@mitre.org", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20832" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20871" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/24479" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/437145" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/437277" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18439" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/306-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=373913" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=15828" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://docs.info.apple.com/article.html?artnum=305214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://seclists.org/lists/fulldisclosure/2006/Jun/0434.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/19929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20832" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/24479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2006/dsa-1112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0083.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/437145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/437277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/437571/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/18439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA06-208A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-072A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/0930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/306-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Gis_line_string::init_from_wkb function in sql/spatial.cc in MySQL 5.1 before 5.1.51 allows remote authenticated users to cause a denial of service (server crash) by calling the PolyFromWKB function with Well-Known Binary (WKB) data containing a crafted number of (1) line strings or (2) line points." }, { "lang": "es", "value": "La funci\u00f3n Gis_line_string::init_from_wkb en el archivo sql/spatial.cc en MySQL versiones 5.1 anteriores a 5.1.51, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (bloqueo del servidor) mediante el llamado a la funci\u00f3n PolyFromWKB con datos Well-Known Binary (WKB) que contienen un n\u00famero especialmente dise\u00f1ado de (1) cadenas de l\u00ednea o (2) puntos de l\u00ednea." } ], "id": "CVE-2010-3840", "lastModified": "2024-11-21T01:19:43.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-14T19:02:44.797", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=51875" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://lists.mysql.com/commits/117094" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "cve@mitre.org", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://bugs.mysql.com/bug.php?id=51875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://lists.mysql.com/commits/117094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/42936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0824.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2010-0825.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2011-0164.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/43676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.turbolinux.co.jp/security/2011/TLSA-2011-3j.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1397-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640865" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64838" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement." }, { "lang": "es", "value": "El archivo storage/innobase/dict/dict0crea.c en mysqld en MySQL de Oracle versiones 5.1 anteriores a 5.1.49, permite a los usuarios autenticados remotos causar una denegaci\u00f3n de servicio (fallo de aserci\u00f3n) mediante la modificaci\u00f3n de la configuraci\u00f3n de los par\u00e1metros (1) innodb_file_format o (2) innodb_file_per_table por el motor de almacenamiento InnoDB y, a continuaci\u00f3n, ejecutar una declaraci\u00f3n DDL." } ], "id": "CVE-2010-3676", "lastModified": "2024-11-21T01:19:21.947", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-01-11T20:00:01.260", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=55039" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/42643" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://bugs.mysql.com/bug.php?id=55039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.openwall.com/lists/oss-security/2010/09/28/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/42643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64689" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql | 5.0.0 | |
mysql | mysql | 5.0.1 | |
mysql | mysql | 5.0.2 | |
mysql | mysql | 5.0.3 | |
mysql | mysql | 5.0.4 | |
mysql | mysql | 5.0.5 | |
mysql | mysql | 5.0.5.0.21 | |
mysql | mysql | 5.0.10 | |
mysql | mysql | 5.0.15 | |
mysql | mysql | 5.0.16 | |
mysql | mysql | 5.0.17 | |
mysql | mysql | 5.0.20 | |
mysql | mysql | 5.0.22.1.0.1 | |
mysql | mysql | 5.0.24 | |
mysql | mysql | 5.1.5 | |
oracle | mysql | 5.0.0 | |
oracle | mysql | 5.0.3 | |
oracle | mysql | 5.0.6 | |
oracle | mysql | 5.0.7 | |
oracle | mysql | 5.0.8 | |
oracle | mysql | 5.0.9 | |
oracle | mysql | 5.0.11 | |
oracle | mysql | 5.0.12 | |
oracle | mysql | 5.0.13 | |
oracle | mysql | 5.0.14 | |
oracle | mysql | 5.0.18 | |
oracle | mysql | 5.0.19 | |
oracle | mysql | 5.0.21 | |
oracle | mysql | 5.0.22 | |
oracle | mysql | 5.0.27 | |
oracle | mysql | 5.0.33 | |
oracle | mysql | 5.0.37 | |
oracle | mysql | 5.1.1 | |
oracle | mysql | 5.1.2 | |
oracle | mysql | 5.1.3 | |
oracle | mysql | 5.1.4 | |
oracle | mysql | 5.1.6 | |
oracle | mysql | 5.1.7 | |
oracle | mysql | 5.1.8 | |
oracle | mysql | 5.1.9 | |
oracle | mysql | 5.1.10 | |
oracle | mysql | 5.1.11 | |
oracle | mysql | 5.1.12 | |
oracle | mysql | 5.1.13 | |
oracle | mysql | 5.1.14 | |
oracle | mysql | 5.1.15 | |
oracle | mysql | 5.1.16 | |
oracle | mysql | 5.1.17 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "BDA03768-74D2-4C5D-ABCF-8A91F9E6C273", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.22.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "214E3CF9-6362-4F5A-91B7-5E69564F7144", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "19001041-22C4-4D2C-A918-378DACBB1DF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.3:beta:*:*:*:*:*:*", "matchCriteriaId": "6F610D56-6BB6-48FB-B43A-670CE9168500", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "1668BB5B-E7FB-4430-B8D5-89E308F5DD39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "E3F44DA1-1509-4AC7-AB6B-2B2A834A16AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "7A2D6DF6-FE5D-428F-BCEB-E7832C2B4FE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7777E919-FD4B-452B-88D7-165410C703F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "A56ACB60-EC2C-45AF-B923-B3A90A2F7AE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "67C52D66-3BCA-4854-BF09-CB6DF1AC0E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "BF54CC8D-B736-461D-B693-686E862EF969", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "5E5EADE4-9E1B-4A1C-B3B5-ACF1287A19E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "053ACE9B-A146-42C0-ADB2-47F6119965D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "30B4F891-2A03-45A8-A49C-7F8B8F7D8407", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "69E62AC4-954E-476C-98BE-C138E328AE7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "6B88385C-F5FB-401F-80D5-5BF11CE3C19D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "11873AEA-5D6C-4AC0-915A-8A2869B2EFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.33:*:*:*:*:*:*:*", "matchCriteriaId": "5965032E-5BC0-4E69-B097-F9EE2B24C861", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.37:*:*:*:*:*:*:*", "matchCriteriaId": "35F21A5A-F9C0-4860-80AD-1D3937483F28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges." }, { "lang": "es", "value": "La funci\u00f3n mysql_change_db en MySQL 5.0.x anterior a 5.0.40 y 5.1.x anterior a 5.1.18 no restaura los privilegios THD::db_access cuando regresa de rutinas almacenadas SQL SECURITY INVOKER, lo cual permite a usuarios autenticados remotamente obtener privilegios." } ], "id": "CVE-2007-2692", "lastModified": "2024-11-21T00:31:25.393", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T01:19:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/bug.php?id=27337" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "source": "cve@mitre.org", "url": "http://lists.mysql.com/announce/470" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/34765" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25301" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26073" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/26430" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/27823" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28637" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29443" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/30351" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/24011" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018070" }, { "source": "cve@mitre.org", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1536" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/bug.php?id=27337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-18.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.mysql.com/announce/470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/34765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/25301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/26430" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/27823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29443" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/30351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2007/dsa-1413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:028" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2007-0894.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2008-0364.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/473874/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/24011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9166" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect mysql packages as shipped in Red Hat Enterprise Linux 2.1, 3 and 4.\n\nAffected mysql packages as shipped in Red Hat Enterprise Linux 5 and Red Hat Application Stack were fixed via:\n\nhttps://rhn.redhat.com/errata/CVE-2007-2692.html", "lastModified": "2008-07-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "578BA199-EF04-4595-AFDE-54FD66B7FC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*", "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*", "matchCriteriaId": "B82E464F-3871-40C7-A758-B81582D193AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*", "matchCriteriaId": "05B7E2C5-6139-47F9-A310-F2BC0EF83942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*", "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*", "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods." } ], "id": "CVE-2003-1480", "lastModified": "2024-11-20T23:47:15.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/8753" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securiteam.com/tools/5WP031FA0U.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/7500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/8753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securiteam.com/tools/5WP031FA0U.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/7500" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-310" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-200801-0204
Vulnerability from variot
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp. yaSSL is prone to multiple remote buffer-overflow vulnerabilities. Failed attacks will cause denial-of-service conditions. yaSSL 1.7.5 is vulnerable to these issues; other versions are also likely to be affected. # MySQL yaSSL SSL Hello Message Buffer Overflow 1. Vulnerability introduction and analysis yaSSL is an open source software package used to implement SSL. There are multiple remote overflow and invalid memory access issues in the yaSSL implementation, and remote attackers may take advantage of this vulnerability to control the server. The yaSSL (1.7.5 and earlier) implementation to Stack Buffer Overflow is bundled with MySQL <= 6.0. Code analysis: The buffer structure used to contain the data in the Hello message received by the client is as follows (from yassl_imp.hpp): class ClientHello : public HandShakeBase { ProtocolVersion client_version_; Random random_; uint8 id_len_; // session id length opaque session_id_[ID_LEN]; uint16 suite_len_; // cipher suite length opaque cipher_suites_[MAX_SUITE_SZ]; uint8 comp_len_; // compression length CompressionMethod compression_methods_; ... Here ID_LEN length is 32 units, MAX_SUITE_SZ is 64, RAN_LEN (RANd_LEN) 32. If an old version of the Hello message is received, the called ProcessOldClientHello function does not perform the necessary checks to limit the amount of data filling the above three fields, resulting in a buffer overflow vulnerability. The following is the vulnerable code in handshake.cpp: void ProcessOldClientHello(input_buffer& input, SSL& ssl) ... ClientHello ch; ... for (uint16 i = 0; i < ch.
Sergei Golubchik found that MySQL did not properly validate optional data or index directory paths given in a CREATE TABLE statement; as well it would not, under certain conditions, prevent two databases from using the same paths for data or index files. This could allow an authenticated user with appropriate privilege to create tables in one database to read and manipulate data in tables later created in other databases, regardless of GRANT privileges (CVE-2008-2079).
The updated packages have been patched to correct these issues.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0227 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079
Updated Packages:
Mandriva Linux 2007.1: 56e59e5a7413ca900767afa20480fff5 2007.1/i586/libmysql15-5.0.45-8.2mdv2007.1.i586.rpm c11348f9b60a3fb153cf07a7b2e22502 2007.1/i586/libmysql-devel-5.0.45-8.2mdv2007.1.i586.rpm a60fca42161427ed528a6a1fd58c61e3 2007.1/i586/libmysql-static-devel-5.0.45-8.2mdv2007.1.i586.rpm a6c4108497edb6cd0d7f723ca5f81c1f 2007.1/i586/mysql-5.0.45-8.2mdv2007.1.i586.rpm 62b091bfed614ed2be0e9f1dabc00e6e 2007.1/i586/mysql-bench-5.0.45-8.2mdv2007.1.i586.rpm 65c4cbcbaa11ad0fd5521ff9821a0e71 2007.1/i586/mysql-client-5.0.45-8.2mdv2007.1.i586.rpm 6cafb4fc0190c3d8c301737cc1b2d584 2007.1/i586/mysql-common-5.0.45-8.2mdv2007.1.i586.rpm ab7ff6bc5ed1e3add97e87eadffdf7d0 2007.1/i586/mysql-max-5.0.45-8.2mdv2007.1.i586.rpm 0c0d3817061fed8a9495b976e9aad4f6 2007.1/i586/mysql-ndb-extra-5.0.45-8.2mdv2007.1.i586.rpm e180f9184b397c76f121fa2cbcc249ee 2007.1/i586/mysql-ndb-management-5.0.45-8.2mdv2007.1.i586.rpm 11f6b6b340ec050489117a31ba1ada7b 2007.1/i586/mysql-ndb-storage-5.0.45-8.2mdv2007.1.i586.rpm 27d5c830d808a9198b5a3234ab635c31 2007.1/i586/mysql-ndb-tools-5.0.45-8.2mdv2007.1.i586.rpm 0b18a06428b4c5351ea19433a18ba44b 2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64: 861ae8a12d105c0537345f4b1b6364a6 2007.1/x86_64/lib64mysql15-5.0.45-8.2mdv2007.1.x86_64.rpm 74995c774432f4acacf682d14b738bae 2007.1/x86_64/lib64mysql-devel-5.0.45-8.2mdv2007.1.x86_64.rpm 5453d884b0edf40606bd78e62aef8101 2007.1/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2007.1.x86_64.rpm ef7ab96c6a492dad1a5f1463eaf5568b 2007.1/x86_64/mysql-5.0.45-8.2mdv2007.1.x86_64.rpm e6527ea8482a7928095a2d1d24953ad6 2007.1/x86_64/mysql-bench-5.0.45-8.2mdv2007.1.x86_64.rpm 896ed2418af55577669d67b2b110fded 2007.1/x86_64/mysql-client-5.0.45-8.2mdv2007.1.x86_64.rpm 9cfc765f29d39220862dd8b38a7baddb 2007.1/x86_64/mysql-common-5.0.45-8.2mdv2007.1.x86_64.rpm f738941dbf2fb982e5f91ad1f5b8dd99 2007.1/x86_64/mysql-max-5.0.45-8.2mdv2007.1.x86_64.rpm 604b3cda2222cc031819c1a76f64974e 2007.1/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2007.1.x86_64.rpm 944f87e17f3a30a41392b57005b3866d 2007.1/x86_64/mysql-ndb-management-5.0.45-8.2mdv2007.1.x86_64.rpm abe714a023e8019dc2379f38a10287c6 2007.1/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2007.1.x86_64.rpm 60585f5c00ea687c710da9bf8dc620b0 2007.1/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2007.1.x86_64.rpm 0b18a06428b4c5351ea19433a18ba44b 2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm
Mandriva Linux 2008.0: 32915a44b313f9752d53864929acacef 2008.0/i586/libmysql15-5.0.45-8.2mdv2008.0.i586.rpm 886f68f93c90d168f0f376f2bdf19dfe 2008.0/i586/libmysql-devel-5.0.45-8.2mdv2008.0.i586.rpm 05d52109e0e751d6ecb330361f0c49b1 2008.0/i586/libmysql-static-devel-5.0.45-8.2mdv2008.0.i586.rpm c2d269602985c48dbfaa56edbb2089a5 2008.0/i586/mysql-5.0.45-8.2mdv2008.0.i586.rpm fe5a49a0dbcf5b5b862fa15c697ec734 2008.0/i586/mysql-bench-5.0.45-8.2mdv2008.0.i586.rpm 5d9e574e07b13db1e98ac5084ef24c52 2008.0/i586/mysql-client-5.0.45-8.2mdv2008.0.i586.rpm c3a73f6ba9467995e4eeeb2994987e8c 2008.0/i586/mysql-common-5.0.45-8.2mdv2008.0.i586.rpm faca35a011bd9e95c3aded56c498efe7 2008.0/i586/mysql-max-5.0.45-8.2mdv2008.0.i586.rpm ae5bece63ecfacd37582c68288e146a6 2008.0/i586/mysql-ndb-extra-5.0.45-8.2mdv2008.0.i586.rpm 6948d8799ff1e8e9ae3908dcfdfafc2a 2008.0/i586/mysql-ndb-management-5.0.45-8.2mdv2008.0.i586.rpm 11566a84793e2eb8b2e55fe28d89b918 2008.0/i586/mysql-ndb-storage-5.0.45-8.2mdv2008.0.i586.rpm 7e8e44013f0de7b0cd2c527da9202985 2008.0/i586/mysql-ndb-tools-5.0.45-8.2mdv2008.0.i586.rpm af4075fd835e0372f1f6745f2f6f2d24 2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: c3683e4b578bcf573913d2c8ea3bcc64 2008.0/x86_64/lib64mysql15-5.0.45-8.2mdv2008.0.x86_64.rpm a15bc584715bfa86221d021a45610701 2008.0/x86_64/lib64mysql-devel-5.0.45-8.2mdv2008.0.x86_64.rpm 7037c5117e10169e7f0d862cb3916a7d 2008.0/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2008.0.x86_64.rpm 624b99283d71f7fc372029d188b0d68e 2008.0/x86_64/mysql-5.0.45-8.2mdv2008.0.x86_64.rpm 3efcb2ad37ae4d91f5915548fcebb0fc 2008.0/x86_64/mysql-bench-5.0.45-8.2mdv2008.0.x86_64.rpm 69b7b8e85e21c015d1db4822885f9e70 2008.0/x86_64/mysql-client-5.0.45-8.2mdv2008.0.x86_64.rpm cd9cc2fd720dedef518fed7f6dbcd851 2008.0/x86_64/mysql-common-5.0.45-8.2mdv2008.0.x86_64.rpm dc1da6c335fdbe30762c3bdc8431de71 2008.0/x86_64/mysql-max-5.0.45-8.2mdv2008.0.x86_64.rpm 065d9a2c3515567c0d11a45a44b2b902 2008.0/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2008.0.x86_64.rpm 8fb80d3e1b683af128b77d1ab9e6ad06 2008.0/x86_64/mysql-ndb-management-5.0.45-8.2mdv2008.0.x86_64.rpm 9e4a50fcfb351876e1294bcc113a9d01 2008.0/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2008.0.x86_64.rpm 0788ada6ccdddb7db76ebcf3efbe8e0b 2008.0/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2008.0.x86_64.rpm af4075fd835e0372f1f6745f2f6f2d24 2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm
Corporate 4.0: 08c68b948479e0609200d3a75fa1e6f8 corporate/4.0/i586/libmysql15-5.0.45-7.2.20060mlcs4.i586.rpm 9559df7a4dd7a7a5cd2f3350d0aaf644 corporate/4.0/i586/libmysql-devel-5.0.45-7.2.20060mlcs4.i586.rpm 7c6b41f3e966a9533fe2e508099e9ac3 corporate/4.0/i586/libmysql-static-devel-5.0.45-7.2.20060mlcs4.i586.rpm 83fc3360f5f3d5e4612e8b2dcccb9d86 corporate/4.0/i586/mysql-5.0.45-7.2.20060mlcs4.i586.rpm 119770dc70f1dec99770b89569d5f244 corporate/4.0/i586/mysql-bench-5.0.45-7.2.20060mlcs4.i586.rpm eaba4a0339945fe1e6f3b2197d43dc6d corporate/4.0/i586/mysql-client-5.0.45-7.2.20060mlcs4.i586.rpm 9d19c37b04c4db67c135ecd277b48d55 corporate/4.0/i586/mysql-common-5.0.45-7.2.20060mlcs4.i586.rpm 29ce0477fee72dd9f76665b7ab3d3733 corporate/4.0/i586/mysql-max-5.0.45-7.2.20060mlcs4.i586.rpm 76ef2d6cedff1526cea6e5391e53bd0b corporate/4.0/i586/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.i586.rpm efd3de6baa6c09f0926e1d71fdcbb7d2 corporate/4.0/i586/mysql-ndb-management-5.0.45-7.2.20060mlcs4.i586.rpm 58acbcf9bd22ae8b686f270959a24d9a corporate/4.0/i586/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.i586.rpm 0679c750bc5dd1f0ad9c26513c9d5a1f corporate/4.0/i586/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.i586.rpm a2744801fe9ed017d4cfb3b40d7dcc42 corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 1540c030207321b12c1dbf6518b259ea corporate/4.0/x86_64/lib64mysql15-5.0.45-7.2.20060mlcs4.x86_64.rpm b8a1daf95d7212f43635d06e709c3318 corporate/4.0/x86_64/lib64mysql-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm 11ff72e78bca0c13e2bbe1d3eba69b6f corporate/4.0/x86_64/lib64mysql-static-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm ec357bc74168b72e716ee47fdc8953ef corporate/4.0/x86_64/mysql-5.0.45-7.2.20060mlcs4.x86_64.rpm 2d4a49b5b2ef6be7f180c37bf6848502 corporate/4.0/x86_64/mysql-bench-5.0.45-7.2.20060mlcs4.x86_64.rpm 5acf56e4dc62af041eeeff90ad32ddbf corporate/4.0/x86_64/mysql-client-5.0.45-7.2.20060mlcs4.x86_64.rpm eadd8f9b5afdadc1e67ab76e63c5ede6 corporate/4.0/x86_64/mysql-common-5.0.45-7.2.20060mlcs4.x86_64.rpm 233bd234e9c9ce5922b9655a6fdd72ce corporate/4.0/x86_64/mysql-max-5.0.45-7.2.20060mlcs4.x86_64.rpm 97494344056c6e4f8340eaf0036ac97f corporate/4.0/x86_64/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.x86_64.rpm ca70ce3ed5c592ec41151b1c6f1d43d8 corporate/4.0/x86_64/mysql-ndb-management-5.0.45-7.2.20060mlcs4.x86_64.rpm 379dab3d7aecfba0b93d5e5691d742db corporate/4.0/x86_64/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.x86_64.rpm e0e9ca0dc122c8657aada9a9db758ca1 corporate/4.0/x86_64/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.x86_64.rpm a2744801fe9ed017d4cfb3b40d7dcc42 corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
iD8DBQFIgkXmmqjQ0CJFipgRAkLWAKClwPBbIW2SXkcexkEJjW79kexPLQCfRirO wV2/ikre4rdv7NLrZRgofos= =qdV+ -----END PGP SIGNATURE----- .
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Nucleus XML-RPC PHP Code Execution Vulnerability
SECUNIA ADVISORY ID: SA15895
VERIFY ADVISORY: http://secunia.com/advisories/15895/
CRITICAL: Highly critical
IMPACT: System access
WHERE:
From remote
SOFTWARE: Nucleus 3.x http://secunia.com/product/3699/
DESCRIPTION: A vulnerability has been reported in Nucleus, which can be exploited by malicious people to compromise a vulnerable system. http://sourceforge.net/project/showfiles.php?group_id=66479
OTHER REFERENCES: SA15852: http://secunia.com/advisories/15852/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. =========================================================== Ubuntu Security Notice USN-588-2 April 02, 2008 mysql-dfsg-5.0 regression https://launchpad.net/bugs/209699 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: mysql-server-5.0 5.0.22-0ubuntu6.06.9
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
USN-588-1 fixed vulnerabilities in MySQL. In fixing CVE-2007-2692 for Ubuntu 6.06, additional improvements were made to make privilege checks more restictive. As a result, an upstream bug was exposed which could cause operations on tables or views in a different database to fail. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Masaaki Hirose discovered that MySQL could be made to dereference a NULL pointer. An authenticated user could cause a denial of service (application crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table. This issue only affects Ubuntu 6.06 and 6.10. (CVE-2006-7232)
Alexander Nozdrin discovered that MySQL did not restore database access privileges when returning from SQL SECURITY INVOKER stored routines. An authenticated user could exploit this to gain privileges. This issue does not affect Ubuntu 7.10. (CVE-2007-2692)
Martin Friebe discovered that MySQL did not properly update the DEFINER value of an altered view. An authenticated user could use CREATE SQL SECURITY DEFINER VIEW and ALTER VIEW statements to gain privileges. (CVE-2007-6303)
Luigi Auriemma discovered that yaSSL as included in MySQL did not properly validate its input. This issue did not affect Ubuntu 6.06 in the default installation. (CVE-2008-0226, CVE-2008-0227)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.diff.gz
Size/MD5: 155085 f8c7ef90adb69cf67cc6366612b63d48
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.dsc
Size/MD5: 1114 d305551acc1c106afc8fcea708bf7748
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz
Size/MD5: 18446645 2b8f36364373461190126817ec872031
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.9_all.deb
Size/MD5: 38560 ba617aed9cc0de2b3ab0bb27e4b73208
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.9_all.deb
Size/MD5: 41108 c5723e8875ec8ec61bc3e35d279b0785
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.9_all.deb
Size/MD5: 38564 4c87c774aa76333f9b6ce71be03abd9e
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_amd64.deb
Size/MD5: 6727828 250a0dc849c954205639795ead8c913c
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_amd64.deb
Size/MD5: 1423476 81fa43f4bcdaa9721311dd9cd7977713
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_amd64.deb
Size/MD5: 6897250 ee100a247642429c58c20cf501da925d
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_amd64.deb
Size/MD5: 22493122 6c8dc59d6b0f8885bdc08e72f7aef6b6
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_i386.deb
Size/MD5: 6141858 992e52adad73209d80bab70f7fb22d46
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_i386.deb
Size/MD5: 1383980 fcbf70966d6875c053e30e153b610991
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_i386.deb
Size/MD5: 6279892 cb5107c59d51513dc3b7d89ef64c2de1
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_i386.deb
Size/MD5: 21351224 84fe07a8a90d1d7bdefcdfa8bf34bc55
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_powerpc.deb
Size/MD5: 6885504 86e9ad51262265b596bf490ce3c46a2d
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_powerpc.deb
Size/MD5: 1463828 6a87ebba2667b07ca253b7bc3772d91e
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb
Size/MD5: 6943956 f8630ffc208f766da49a1628076830b6
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb
Size/MD5: 22706410 6e44a8947af147ac14a15fdd66e80bfd
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_sparc.deb
Size/MD5: 6433916 dea5c30c9bc61cf362cfbb7cb692a280
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_sparc.deb
Size/MD5: 1435924 5da529e0936388dc5584deb4155ba390
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_sparc.deb
Size/MD5: 6538958 4e658a8fca75f30eeafbfff2a2bffa9c
http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_sparc.deb
Size/MD5: 21972902 4d273677401e7896b4e65d8fc9996ce5
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1478-1 security@debian.org http://www.debian.org/security/ Moritz Muehlenhoff January 28, 2008 http://www.debian.org/security/faq
Package : mysql-dfsg-5.0 Vulnerability : buffer overflows Problem type : remote Debian-specific: no CVE Id(s) : CVE-2008-0226 CVE-2008-0227
Luigi Auriemma discovered two buffer overflows in YaSSL, an SSL implementation included in the MySQL database package, which could lead to denial of service and possibly the execution of arbitrary code.
For the unstable distribution (sid), these problems have been fixed in version 5.0.51-3.
For the stable distribution (etch), these problems have been fixed in version 5.0.32-7etch5.
The old stable distribution (sarge) doesn't contain mysql-dfsg-5.0.
We recommend that you upgrade your mysql-dfsg-5.0 package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian 4.0 (stable)
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz Size/MD5 checksum: 165895 05351b7ac0547d3666828c7eba89ee18 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.dsc Size/MD5 checksum: 1117 7d6a184cf5bda53d18be88728a0635c4
Architecture independent packages:
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch5_all.deb Size/MD5 checksum: 45636 c2d87b9755088b3a67851dc4867a67f8 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch5_all.deb Size/MD5 checksum: 47716 5c9311fc2072be8336424c648497303e http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch5_all.deb Size/MD5 checksum: 53944 3a16dd0a2c795cf7e906c648844a9779
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 8912752 826f18c201582262ee622ed9e470a915 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 1950712 47215338ef678adf7ca6f80d9d60613e http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 8407802 e6e87a2edaf5f0405473fb3f5c859b3f http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 27365718 f83e12f0f36c31b4dbd64ab7b1b6f01d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_alpha.deb Size/MD5 checksum: 47748 91489bb86084a9f6026c6156a4a5faa0
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 7376450 ba1c75fa6963352a0af68c4db08d0c12 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 47708 4a3047795b3030063a47c969cfe4c324 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 1830910 c24fc179d4fb37994b5af2cb8c405ff1 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 25939846 8b0e047de274ed90f69a76f22866561a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_amd64.deb Size/MD5 checksum: 7547346 003c7231b81203a50ec563ff5142a010
arm architecture (ARM)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_arm.deb Size/MD5 checksum: 47756 0145e1aa5ec02b5c60c2d78bbcd334a0 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_arm.deb Size/MD5 checksum: 25345622 2de813c86f1d10fb2df34d8b9de2336e http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_arm.deb Size/MD5 checksum: 6929754 8a6b3351769b567a468bc7dcb97a2141 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_arm.deb Size/MD5 checksum: 7204866 a8f69933d8081e753b76402e47e7a64a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_arm.deb Size/MD5 checksum: 1747880 8da665b5f04444dcde03321f24ca8e4b
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 1920486 cb9a2e86902dc3f174926fbd8397a969 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 8046116 1eb6b1199a2c0f6a8502008a2c6df376 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 27055710 085b261bf2ec3820e21ec73bb59f6caa http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 47708 c17ca051ebe8783fa120c4596e32d9c2 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_hppa.deb Size/MD5 checksum: 8003914 59650ba346b2af0d77afbac64e93cca8
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_i386.deb Size/MD5 checksum: 25370152 d615311235c5a9e6d85e7e77b4927d5d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_i386.deb Size/MD5 checksum: 47746 1040540bc74e34b67d9606a4368162a7 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_i386.deb Size/MD5 checksum: 6971870 90aae8d289cb3df24009c65b1af3b12d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_i386.deb Size/MD5 checksum: 7189880 6082aa213539a361cced40044161d108 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_i386.deb Size/MD5 checksum: 1793974 ab7cbdd14a9bff04066a865634ef1ce2
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 9736902 1e93082931f1055cd4c1436caa0020f3 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 47710 3369d882bf2b99a05397aaeddf8bf864 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 2115340 472e412113e7ae0bb76853cf0167cd57 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 30408810 8c8982aae5e90c451b08f22bc2a5399d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_ia64.deb Size/MD5 checksum: 10341648 a5ef1b86109c465131ccfe5a9147bd74
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mips.deb Size/MD5 checksum: 7655576 b92c42fbbd64a377fcc4277a1696ccdd http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mips.deb Size/MD5 checksum: 1835994 2650808f606406336f55b31497bea015 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mips.deb Size/MD5 checksum: 7749018 db3eb1fb41084f7cda145ecc1f808402 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mips.deb Size/MD5 checksum: 47710 698fd659ef265c937dd045cfb2e9e28a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mips.deb Size/MD5 checksum: 26338840 89c569b544aeb60ce6aae1c77d40965e
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 1789510 2501eed6aaa7143a89f13e4bd9658ecf http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 47718 ed3dc0fc53b78b2307dc4790ff82a174 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 7640356 5417137e8b9632964ea0d67e8cd96416 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 25845474 d379d4a5f900202d6244858d379aa46a http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mipsel.deb Size/MD5 checksum: 7561164 31fa1242af6a762a92486aa327469d1f
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 1832312 c6ab2b2c70aed56a7748eb0a5dd04c8c http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 7573184 f43fb3a11284830b745346775073f92d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 7511850 184e9e37e760f4bb3779385d134975db http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 47708 a76913df77b9f358f88a66875dc13a46 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_powerpc.deb Size/MD5 checksum: 26164462 386da660c381925416238a51b0a847a4
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_s390.deb Size/MD5 checksum: 47714 7fa0b60bff0e106f6328b0b026566008 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_s390.deb Size/MD5 checksum: 26763646 544f49b13f6207c1a104dc9eef9e6dd9 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_s390.deb Size/MD5 checksum: 7413442 b70c6184c3b82ead175debdd569ab807 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_s390.deb Size/MD5 checksum: 7507380 f9cecc1ace4fd2455516986637490930 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_s390.deb Size/MD5 checksum: 1951732 d5eaad746a8db92889febd0da68f1ae5
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 7153228 566328488d67a3843b04689d76f0253d http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 47714 551a6f9a790b301d63c856ecab13be75 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 7013384 3915c6846d5ffce6e321b7e40006cb66 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 1797430 b0bd228090c8923d08c9b8ee84a1edb8 http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_sparc.deb Size/MD5 checksum: 25425084 a9934459b8cde72354ffc463b2ec140f
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFHnjjKXm3vHE4uyloRApi/AKCLKlM616TTchb0zEQ8K4cOCdgZhwCffa1J oQ57J3yhzeNDDwqXdxLvhxM= =6ogr -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200801-0204", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.2" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.4" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.46" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.11" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.12" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.16" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.30" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.42" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.14" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.40" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.15" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.22" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.23" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.44" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.1.5" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.36" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.15" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.10" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.52" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "6.10" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.1" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.58" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.7" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.66" }, { "model": "yassl", "scope": "lte", "trust": 1.0, "vendor": "yassl", "version": "1.7.5" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.17" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.20" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "7.04" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.5" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.20" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.3" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.45" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.62" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "6.06" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.18" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.44" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "5.0" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.4" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.60" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.51" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.28" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.8" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.25" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.66" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.3" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.56" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.48" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "7.10" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.16" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.10" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.6" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.9" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.32" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.64" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.13" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.0" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.17" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.41" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.50" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.30" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.38" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.19" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.21" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.60" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.54" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.34" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.1.2" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.36" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.4" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.26" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.1" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "mysql", "version": "5.0.24" }, { "model": "mysql", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "5.0.56" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "drupal", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "gentoo linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandriva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "pear xml rpc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "phpxmlrpc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "postnuke", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "serendipity", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "wordpress", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "xoops", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "phpmyfaq", "version": null }, { "model": "mysql", "scope": "lt", "trust": 0.8, "vendor": "mysql ab", "version": "5.1.23" }, { "model": "community server", "scope": "lt", "trust": 0.8, "vendor": "mysql ab", "version": "5.0.51a" }, { "model": "enterprise server", "scope": "lt", "trust": 0.8, "vendor": "mysql ab", "version": "5.0.50sp1a" }, { "model": "enterprise server", "scope": "lt", "trust": 0.8, "vendor": "mysql ab", "version": "5.0.54a" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.5" }, { "model": "mysql", "scope": "eq", "trust": 0.6, "vendor": "mysql", "version": "5.1.20" }, { "model": "mysql", "scope": "eq", "trust": 0.6, "vendor": "mysql", "version": "5.1.21" }, { "model": "yassl", "scope": "eq", "trust": 0.3, "vendor": "yassl", "version": "1.7.5" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.10" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "7.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.10" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "6.06" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2008.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2007.1" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "4.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "4.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" } ], "sources": [ { "db": "CERT/CC", "id": "VU#442845" }, { "db": "BID", "id": "27140" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "CNNVD", "id": "CNNVD-200801-154" }, { "db": "NVD", "id": "CVE-2008-0226" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:yassl:yassl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.7.5", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.34:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.44:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.60:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.62:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.50:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.66:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.30:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.36:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.0.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.56:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.0.66:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2008-0226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Luigi Auriemma\u203b aluigi@pivx.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-154" } ], "trust": 0.6 }, "cve": "CVE-2008-0226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2008-0226", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-30351", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2008-0226", "trust": 1.8, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#442845", "trust": 0.8, "value": "20.75" }, { "author": "CNNVD", "id": "CNNVD-200801-154", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-30351", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2008-0226", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#442845" }, { "db": "VULHUB", "id": "VHN-30351" }, { "db": "VULMON", "id": "CVE-2008-0226" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "CNNVD", "id": "CNNVD-200801-154" }, { "db": "NVD", "id": "CVE-2008-0226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) \"input_buffer\u0026 operator\u003e\u003e\" in yassl_imp.cpp. yaSSL is prone to multiple remote buffer-overflow vulnerabilities. Failed attacks will cause denial-of-service conditions. \nyaSSL 1.7.5 is vulnerable to these issues; other versions are also likely to be affected. # MySQL yaSSL SSL Hello Message Buffer Overflow 1. Vulnerability introduction and analysis yaSSL is an open source software package used to implement SSL. There are multiple remote overflow and invalid memory access issues in the yaSSL implementation, and remote attackers may take advantage of this vulnerability to control the server. The yaSSL (1.7.5 and earlier) implementation to Stack Buffer Overflow is bundled with MySQL \u003c= 6.0. Code analysis: The buffer structure used to contain the data in the Hello message received by the client is as follows (from yassl_imp.hpp): class ClientHello : public HandShakeBase { ProtocolVersion client_version_; Random random_; uint8 id_len_; // session id length opaque session_id_[ID_LEN]; uint16 suite_len_; // cipher suite length opaque cipher_suites_[MAX_SUITE_SZ]; uint8 comp_len_; // compression length CompressionMethod compression_methods_; ... Here ID_LEN length is 32 units, MAX_SUITE_SZ is 64, RAN_LEN (RANd_LEN) 32. If an old version of the Hello message is received, the called ProcessOldClientHello function does not perform the necessary checks to limit the amount of data filling the above three fields, resulting in a buffer overflow vulnerability. The following is the vulnerable code in handshake.cpp: void ProcessOldClientHello(input_buffer\u0026 input, SSL\u0026 ssl) ... ClientHello ch; ... for (uint16 i = 0; i \u003c ch. \n \n Sergei Golubchik found that MySQL did not properly validate optional\n data or index directory paths given in a CREATE TABLE statement; as\n well it would not, under certain conditions, prevent two databases\n from using the same paths for data or index files. This could allow\n an authenticated user with appropriate privilege to create tables in\n one database to read and manipulate data in tables later created in\n other databases, regardless of GRANT privileges (CVE-2008-2079). \n \n The updated packages have been patched to correct these issues. \n _______________________________________________________________________\n\n References:\n \n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0226\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0227\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079\n _______________________________________________________________________\n \n Updated Packages:\n \n Mandriva Linux 2007.1:\n 56e59e5a7413ca900767afa20480fff5 2007.1/i586/libmysql15-5.0.45-8.2mdv2007.1.i586.rpm\n c11348f9b60a3fb153cf07a7b2e22502 2007.1/i586/libmysql-devel-5.0.45-8.2mdv2007.1.i586.rpm\n a60fca42161427ed528a6a1fd58c61e3 2007.1/i586/libmysql-static-devel-5.0.45-8.2mdv2007.1.i586.rpm\n a6c4108497edb6cd0d7f723ca5f81c1f 2007.1/i586/mysql-5.0.45-8.2mdv2007.1.i586.rpm\n 62b091bfed614ed2be0e9f1dabc00e6e 2007.1/i586/mysql-bench-5.0.45-8.2mdv2007.1.i586.rpm\n 65c4cbcbaa11ad0fd5521ff9821a0e71 2007.1/i586/mysql-client-5.0.45-8.2mdv2007.1.i586.rpm\n 6cafb4fc0190c3d8c301737cc1b2d584 2007.1/i586/mysql-common-5.0.45-8.2mdv2007.1.i586.rpm\n ab7ff6bc5ed1e3add97e87eadffdf7d0 2007.1/i586/mysql-max-5.0.45-8.2mdv2007.1.i586.rpm\n 0c0d3817061fed8a9495b976e9aad4f6 2007.1/i586/mysql-ndb-extra-5.0.45-8.2mdv2007.1.i586.rpm\n e180f9184b397c76f121fa2cbcc249ee 2007.1/i586/mysql-ndb-management-5.0.45-8.2mdv2007.1.i586.rpm\n 11f6b6b340ec050489117a31ba1ada7b 2007.1/i586/mysql-ndb-storage-5.0.45-8.2mdv2007.1.i586.rpm\n 27d5c830d808a9198b5a3234ab635c31 2007.1/i586/mysql-ndb-tools-5.0.45-8.2mdv2007.1.i586.rpm \n 0b18a06428b4c5351ea19433a18ba44b 2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm\n\n Mandriva Linux 2007.1/X86_64:\n 861ae8a12d105c0537345f4b1b6364a6 2007.1/x86_64/lib64mysql15-5.0.45-8.2mdv2007.1.x86_64.rpm\n 74995c774432f4acacf682d14b738bae 2007.1/x86_64/lib64mysql-devel-5.0.45-8.2mdv2007.1.x86_64.rpm\n 5453d884b0edf40606bd78e62aef8101 2007.1/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2007.1.x86_64.rpm\n ef7ab96c6a492dad1a5f1463eaf5568b 2007.1/x86_64/mysql-5.0.45-8.2mdv2007.1.x86_64.rpm\n e6527ea8482a7928095a2d1d24953ad6 2007.1/x86_64/mysql-bench-5.0.45-8.2mdv2007.1.x86_64.rpm\n 896ed2418af55577669d67b2b110fded 2007.1/x86_64/mysql-client-5.0.45-8.2mdv2007.1.x86_64.rpm\n 9cfc765f29d39220862dd8b38a7baddb 2007.1/x86_64/mysql-common-5.0.45-8.2mdv2007.1.x86_64.rpm\n f738941dbf2fb982e5f91ad1f5b8dd99 2007.1/x86_64/mysql-max-5.0.45-8.2mdv2007.1.x86_64.rpm\n 604b3cda2222cc031819c1a76f64974e 2007.1/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2007.1.x86_64.rpm\n 944f87e17f3a30a41392b57005b3866d 2007.1/x86_64/mysql-ndb-management-5.0.45-8.2mdv2007.1.x86_64.rpm\n abe714a023e8019dc2379f38a10287c6 2007.1/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2007.1.x86_64.rpm\n 60585f5c00ea687c710da9bf8dc620b0 2007.1/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2007.1.x86_64.rpm \n 0b18a06428b4c5351ea19433a18ba44b 2007.1/SRPMS/mysql-5.0.45-8.2mdv2007.1.src.rpm\n\n Mandriva Linux 2008.0:\n 32915a44b313f9752d53864929acacef 2008.0/i586/libmysql15-5.0.45-8.2mdv2008.0.i586.rpm\n 886f68f93c90d168f0f376f2bdf19dfe 2008.0/i586/libmysql-devel-5.0.45-8.2mdv2008.0.i586.rpm\n 05d52109e0e751d6ecb330361f0c49b1 2008.0/i586/libmysql-static-devel-5.0.45-8.2mdv2008.0.i586.rpm\n c2d269602985c48dbfaa56edbb2089a5 2008.0/i586/mysql-5.0.45-8.2mdv2008.0.i586.rpm\n fe5a49a0dbcf5b5b862fa15c697ec734 2008.0/i586/mysql-bench-5.0.45-8.2mdv2008.0.i586.rpm\n 5d9e574e07b13db1e98ac5084ef24c52 2008.0/i586/mysql-client-5.0.45-8.2mdv2008.0.i586.rpm\n c3a73f6ba9467995e4eeeb2994987e8c 2008.0/i586/mysql-common-5.0.45-8.2mdv2008.0.i586.rpm\n faca35a011bd9e95c3aded56c498efe7 2008.0/i586/mysql-max-5.0.45-8.2mdv2008.0.i586.rpm\n ae5bece63ecfacd37582c68288e146a6 2008.0/i586/mysql-ndb-extra-5.0.45-8.2mdv2008.0.i586.rpm\n 6948d8799ff1e8e9ae3908dcfdfafc2a 2008.0/i586/mysql-ndb-management-5.0.45-8.2mdv2008.0.i586.rpm\n 11566a84793e2eb8b2e55fe28d89b918 2008.0/i586/mysql-ndb-storage-5.0.45-8.2mdv2008.0.i586.rpm\n 7e8e44013f0de7b0cd2c527da9202985 2008.0/i586/mysql-ndb-tools-5.0.45-8.2mdv2008.0.i586.rpm \n af4075fd835e0372f1f6745f2f6f2d24 2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n c3683e4b578bcf573913d2c8ea3bcc64 2008.0/x86_64/lib64mysql15-5.0.45-8.2mdv2008.0.x86_64.rpm\n a15bc584715bfa86221d021a45610701 2008.0/x86_64/lib64mysql-devel-5.0.45-8.2mdv2008.0.x86_64.rpm\n 7037c5117e10169e7f0d862cb3916a7d 2008.0/x86_64/lib64mysql-static-devel-5.0.45-8.2mdv2008.0.x86_64.rpm\n 624b99283d71f7fc372029d188b0d68e 2008.0/x86_64/mysql-5.0.45-8.2mdv2008.0.x86_64.rpm\n 3efcb2ad37ae4d91f5915548fcebb0fc 2008.0/x86_64/mysql-bench-5.0.45-8.2mdv2008.0.x86_64.rpm\n 69b7b8e85e21c015d1db4822885f9e70 2008.0/x86_64/mysql-client-5.0.45-8.2mdv2008.0.x86_64.rpm\n cd9cc2fd720dedef518fed7f6dbcd851 2008.0/x86_64/mysql-common-5.0.45-8.2mdv2008.0.x86_64.rpm\n dc1da6c335fdbe30762c3bdc8431de71 2008.0/x86_64/mysql-max-5.0.45-8.2mdv2008.0.x86_64.rpm\n 065d9a2c3515567c0d11a45a44b2b902 2008.0/x86_64/mysql-ndb-extra-5.0.45-8.2mdv2008.0.x86_64.rpm\n 8fb80d3e1b683af128b77d1ab9e6ad06 2008.0/x86_64/mysql-ndb-management-5.0.45-8.2mdv2008.0.x86_64.rpm\n 9e4a50fcfb351876e1294bcc113a9d01 2008.0/x86_64/mysql-ndb-storage-5.0.45-8.2mdv2008.0.x86_64.rpm\n 0788ada6ccdddb7db76ebcf3efbe8e0b 2008.0/x86_64/mysql-ndb-tools-5.0.45-8.2mdv2008.0.x86_64.rpm \n af4075fd835e0372f1f6745f2f6f2d24 2008.0/SRPMS/mysql-5.0.45-8.2mdv2008.0.src.rpm\n\n Corporate 4.0:\n 08c68b948479e0609200d3a75fa1e6f8 corporate/4.0/i586/libmysql15-5.0.45-7.2.20060mlcs4.i586.rpm\n 9559df7a4dd7a7a5cd2f3350d0aaf644 corporate/4.0/i586/libmysql-devel-5.0.45-7.2.20060mlcs4.i586.rpm\n 7c6b41f3e966a9533fe2e508099e9ac3 corporate/4.0/i586/libmysql-static-devel-5.0.45-7.2.20060mlcs4.i586.rpm\n 83fc3360f5f3d5e4612e8b2dcccb9d86 corporate/4.0/i586/mysql-5.0.45-7.2.20060mlcs4.i586.rpm\n 119770dc70f1dec99770b89569d5f244 corporate/4.0/i586/mysql-bench-5.0.45-7.2.20060mlcs4.i586.rpm\n eaba4a0339945fe1e6f3b2197d43dc6d corporate/4.0/i586/mysql-client-5.0.45-7.2.20060mlcs4.i586.rpm\n 9d19c37b04c4db67c135ecd277b48d55 corporate/4.0/i586/mysql-common-5.0.45-7.2.20060mlcs4.i586.rpm\n 29ce0477fee72dd9f76665b7ab3d3733 corporate/4.0/i586/mysql-max-5.0.45-7.2.20060mlcs4.i586.rpm\n 76ef2d6cedff1526cea6e5391e53bd0b corporate/4.0/i586/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.i586.rpm\n efd3de6baa6c09f0926e1d71fdcbb7d2 corporate/4.0/i586/mysql-ndb-management-5.0.45-7.2.20060mlcs4.i586.rpm\n 58acbcf9bd22ae8b686f270959a24d9a corporate/4.0/i586/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.i586.rpm\n 0679c750bc5dd1f0ad9c26513c9d5a1f corporate/4.0/i586/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.i586.rpm \n a2744801fe9ed017d4cfb3b40d7dcc42 corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 1540c030207321b12c1dbf6518b259ea corporate/4.0/x86_64/lib64mysql15-5.0.45-7.2.20060mlcs4.x86_64.rpm\n b8a1daf95d7212f43635d06e709c3318 corporate/4.0/x86_64/lib64mysql-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 11ff72e78bca0c13e2bbe1d3eba69b6f corporate/4.0/x86_64/lib64mysql-static-devel-5.0.45-7.2.20060mlcs4.x86_64.rpm\n ec357bc74168b72e716ee47fdc8953ef corporate/4.0/x86_64/mysql-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 2d4a49b5b2ef6be7f180c37bf6848502 corporate/4.0/x86_64/mysql-bench-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 5acf56e4dc62af041eeeff90ad32ddbf corporate/4.0/x86_64/mysql-client-5.0.45-7.2.20060mlcs4.x86_64.rpm\n eadd8f9b5afdadc1e67ab76e63c5ede6 corporate/4.0/x86_64/mysql-common-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 233bd234e9c9ce5922b9655a6fdd72ce corporate/4.0/x86_64/mysql-max-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 97494344056c6e4f8340eaf0036ac97f corporate/4.0/x86_64/mysql-ndb-extra-5.0.45-7.2.20060mlcs4.x86_64.rpm\n ca70ce3ed5c592ec41151b1c6f1d43d8 corporate/4.0/x86_64/mysql-ndb-management-5.0.45-7.2.20060mlcs4.x86_64.rpm\n 379dab3d7aecfba0b93d5e5691d742db corporate/4.0/x86_64/mysql-ndb-storage-5.0.45-7.2.20060mlcs4.x86_64.rpm\n e0e9ca0dc122c8657aada9a9db758ca1 corporate/4.0/x86_64/mysql-ndb-tools-5.0.45-7.2.20060mlcs4.x86_64.rpm \n a2744801fe9ed017d4cfb3b40d7dcc42 corporate/4.0/SRPMS/mysql-5.0.45-7.2.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFIgkXmmqjQ0CJFipgRAkLWAKClwPBbIW2SXkcexkEJjW79kexPLQCfRirO\nwV2/ikre4rdv7NLrZRgofos=\n=qdV+\n-----END PGP SIGNATURE-----\n. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nNucleus XML-RPC PHP Code Execution Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15895\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15895/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nNucleus 3.x\nhttp://secunia.com/product/3699/\n\nDESCRIPTION:\nA vulnerability has been reported in Nucleus, which can be exploited\nby malicious people to compromise a vulnerable system. \nhttp://sourceforge.net/project/showfiles.php?group_id=66479\n\nOTHER REFERENCES:\nSA15852:\nhttp://secunia.com/advisories/15852/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. =========================================================== \nUbuntu Security Notice USN-588-2 April 02, 2008\nmysql-dfsg-5.0 regression\nhttps://launchpad.net/bugs/209699\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n mysql-server-5.0 5.0.22-0ubuntu6.06.9\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. \n\nDetails follow:\n\nUSN-588-1 fixed vulnerabilities in MySQL. In fixing CVE-2007-2692 for\nUbuntu 6.06, additional improvements were made to make privilege checks\nmore restictive. As a result, an upstream bug was exposed which could\ncause operations on tables or views in a different database to fail. This\nupdate fixes the problem. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Masaaki Hirose discovered that MySQL could be made to dereference\n a NULL pointer. An authenticated user could cause a denial of service\n (application crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA\n table. This issue only affects Ubuntu 6.06 and 6.10. (CVE-2006-7232)\n \n Alexander Nozdrin discovered that MySQL did not restore database access\n privileges when returning from SQL SECURITY INVOKER stored routines. An\n authenticated user could exploit this to gain privileges. This issue\n does not affect Ubuntu 7.10. (CVE-2007-2692)\n \n Martin Friebe discovered that MySQL did not properly update the DEFINER\n value of an altered view. An authenticated user could use CREATE SQL\n SECURITY DEFINER VIEW and ALTER VIEW statements to gain privileges. \n (CVE-2007-6303)\n \n Luigi Auriemma discovered that yaSSL as included in MySQL did not\n properly validate its input. This issue did not affect Ubuntu 6.06 in the default installation. \n (CVE-2008-0226, CVE-2008-0227)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.diff.gz\n Size/MD5: 155085 f8c7ef90adb69cf67cc6366612b63d48\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.dsc\n Size/MD5: 1114 d305551acc1c106afc8fcea708bf7748\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz\n Size/MD5: 18446645 2b8f36364373461190126817ec872031\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.9_all.deb\n Size/MD5: 38560 ba617aed9cc0de2b3ab0bb27e4b73208\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.9_all.deb\n Size/MD5: 41108 c5723e8875ec8ec61bc3e35d279b0785\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.9_all.deb\n Size/MD5: 38564 4c87c774aa76333f9b6ce71be03abd9e\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_amd64.deb\n Size/MD5: 6727828 250a0dc849c954205639795ead8c913c\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_amd64.deb\n Size/MD5: 1423476 81fa43f4bcdaa9721311dd9cd7977713\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_amd64.deb\n Size/MD5: 6897250 ee100a247642429c58c20cf501da925d\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_amd64.deb\n Size/MD5: 22493122 6c8dc59d6b0f8885bdc08e72f7aef6b6\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_i386.deb\n Size/MD5: 6141858 992e52adad73209d80bab70f7fb22d46\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_i386.deb\n Size/MD5: 1383980 fcbf70966d6875c053e30e153b610991\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_i386.deb\n Size/MD5: 6279892 cb5107c59d51513dc3b7d89ef64c2de1\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_i386.deb\n Size/MD5: 21351224 84fe07a8a90d1d7bdefcdfa8bf34bc55\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_powerpc.deb\n Size/MD5: 6885504 86e9ad51262265b596bf490ce3c46a2d\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_powerpc.deb\n Size/MD5: 1463828 6a87ebba2667b07ca253b7bc3772d91e\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb\n Size/MD5: 6943956 f8630ffc208f766da49a1628076830b6\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb\n Size/MD5: 22706410 6e44a8947af147ac14a15fdd66e80bfd\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_sparc.deb\n Size/MD5: 6433916 dea5c30c9bc61cf362cfbb7cb692a280\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_sparc.deb\n Size/MD5: 1435924 5da529e0936388dc5584deb4155ba390\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_sparc.deb\n Size/MD5: 6538958 4e658a8fca75f30eeafbfff2a2bffa9c\n http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_sparc.deb\n Size/MD5: 21972902 4d273677401e7896b4e65d8fc9996ce5\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1478-1 security@debian.org\nhttp://www.debian.org/security/ Moritz Muehlenhoff\nJanuary 28, 2008 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : mysql-dfsg-5.0\nVulnerability : buffer overflows\nProblem type : remote\nDebian-specific: no\nCVE Id(s) : CVE-2008-0226 CVE-2008-0227\n\nLuigi Auriemma discovered two buffer overflows in YaSSL, an SSL\nimplementation included in the MySQL database package, which could lead\nto denial of service and possibly the execution of arbitrary code. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 5.0.51-3. \n\nFor the stable distribution (etch), these problems have been fixed in\nversion 5.0.32-7etch5. \n\nThe old stable distribution (sarge) doesn\u0027t contain mysql-dfsg-5.0. \n\nWe recommend that you upgrade your mysql-dfsg-5.0 package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian 4.0 (stable)\n- -------------------\n\nStable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz\n Size/MD5 checksum: 16439441 f99df050b0b847adf7702b44e79ac877\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz\n Size/MD5 checksum: 165895 05351b7ac0547d3666828c7eba89ee18\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.dsc\n Size/MD5 checksum: 1117 7d6a184cf5bda53d18be88728a0635c4\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch5_all.deb\n Size/MD5 checksum: 45636 c2d87b9755088b3a67851dc4867a67f8\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch5_all.deb\n Size/MD5 checksum: 47716 5c9311fc2072be8336424c648497303e\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch5_all.deb\n Size/MD5 checksum: 53944 3a16dd0a2c795cf7e906c648844a9779\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb\n Size/MD5 checksum: 8912752 826f18c201582262ee622ed9e470a915\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_alpha.deb\n Size/MD5 checksum: 1950712 47215338ef678adf7ca6f80d9d60613e\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_alpha.deb\n Size/MD5 checksum: 8407802 e6e87a2edaf5f0405473fb3f5c859b3f\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_alpha.deb\n Size/MD5 checksum: 27365718 f83e12f0f36c31b4dbd64ab7b1b6f01d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_alpha.deb\n Size/MD5 checksum: 47748 91489bb86084a9f6026c6156a4a5faa0\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb\n Size/MD5 checksum: 7376450 ba1c75fa6963352a0af68c4db08d0c12\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_amd64.deb\n Size/MD5 checksum: 47708 4a3047795b3030063a47c969cfe4c324\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_amd64.deb\n Size/MD5 checksum: 1830910 c24fc179d4fb37994b5af2cb8c405ff1\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_amd64.deb\n Size/MD5 checksum: 25939846 8b0e047de274ed90f69a76f22866561a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_amd64.deb\n Size/MD5 checksum: 7547346 003c7231b81203a50ec563ff5142a010\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_arm.deb\n Size/MD5 checksum: 47756 0145e1aa5ec02b5c60c2d78bbcd334a0\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_arm.deb\n Size/MD5 checksum: 25345622 2de813c86f1d10fb2df34d8b9de2336e\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_arm.deb\n Size/MD5 checksum: 6929754 8a6b3351769b567a468bc7dcb97a2141\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_arm.deb\n Size/MD5 checksum: 7204866 a8f69933d8081e753b76402e47e7a64a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_arm.deb\n Size/MD5 checksum: 1747880 8da665b5f04444dcde03321f24ca8e4b\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_hppa.deb\n Size/MD5 checksum: 1920486 cb9a2e86902dc3f174926fbd8397a969\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb\n Size/MD5 checksum: 8046116 1eb6b1199a2c0f6a8502008a2c6df376\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_hppa.deb\n Size/MD5 checksum: 27055710 085b261bf2ec3820e21ec73bb59f6caa\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_hppa.deb\n Size/MD5 checksum: 47708 c17ca051ebe8783fa120c4596e32d9c2\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_hppa.deb\n Size/MD5 checksum: 8003914 59650ba346b2af0d77afbac64e93cca8\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_i386.deb\n Size/MD5 checksum: 25370152 d615311235c5a9e6d85e7e77b4927d5d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_i386.deb\n Size/MD5 checksum: 47746 1040540bc74e34b67d9606a4368162a7\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_i386.deb\n Size/MD5 checksum: 6971870 90aae8d289cb3df24009c65b1af3b12d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_i386.deb\n Size/MD5 checksum: 7189880 6082aa213539a361cced40044161d108\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_i386.deb\n Size/MD5 checksum: 1793974 ab7cbdd14a9bff04066a865634ef1ce2\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb\n Size/MD5 checksum: 9736902 1e93082931f1055cd4c1436caa0020f3\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_ia64.deb\n Size/MD5 checksum: 47710 3369d882bf2b99a05397aaeddf8bf864\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_ia64.deb\n Size/MD5 checksum: 2115340 472e412113e7ae0bb76853cf0167cd57\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_ia64.deb\n Size/MD5 checksum: 30408810 8c8982aae5e90c451b08f22bc2a5399d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_ia64.deb\n Size/MD5 checksum: 10341648 a5ef1b86109c465131ccfe5a9147bd74\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mips.deb\n Size/MD5 checksum: 7655576 b92c42fbbd64a377fcc4277a1696ccdd\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mips.deb\n Size/MD5 checksum: 1835994 2650808f606406336f55b31497bea015\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mips.deb\n Size/MD5 checksum: 7749018 db3eb1fb41084f7cda145ecc1f808402\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mips.deb\n Size/MD5 checksum: 47710 698fd659ef265c937dd045cfb2e9e28a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mips.deb\n Size/MD5 checksum: 26338840 89c569b544aeb60ce6aae1c77d40965e\n\nmipsel architecture (MIPS (Little Endian))\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mipsel.deb\n Size/MD5 checksum: 1789510 2501eed6aaa7143a89f13e4bd9658ecf\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mipsel.deb\n Size/MD5 checksum: 47718 ed3dc0fc53b78b2307dc4790ff82a174\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb\n Size/MD5 checksum: 7640356 5417137e8b9632964ea0d67e8cd96416\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mipsel.deb\n Size/MD5 checksum: 25845474 d379d4a5f900202d6244858d379aa46a\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mipsel.deb\n Size/MD5 checksum: 7561164 31fa1242af6a762a92486aa327469d1f\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_powerpc.deb\n Size/MD5 checksum: 1832312 c6ab2b2c70aed56a7748eb0a5dd04c8c\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_powerpc.deb\n Size/MD5 checksum: 7573184 f43fb3a11284830b745346775073f92d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb\n Size/MD5 checksum: 7511850 184e9e37e760f4bb3779385d134975db\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_powerpc.deb\n Size/MD5 checksum: 47708 a76913df77b9f358f88a66875dc13a46\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_powerpc.deb\n Size/MD5 checksum: 26164462 386da660c381925416238a51b0a847a4\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_s390.deb\n Size/MD5 checksum: 47714 7fa0b60bff0e106f6328b0b026566008\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_s390.deb\n Size/MD5 checksum: 26763646 544f49b13f6207c1a104dc9eef9e6dd9\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_s390.deb\n Size/MD5 checksum: 7413442 b70c6184c3b82ead175debdd569ab807\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_s390.deb\n Size/MD5 checksum: 7507380 f9cecc1ace4fd2455516986637490930\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_s390.deb\n Size/MD5 checksum: 1951732 d5eaad746a8db92889febd0da68f1ae5\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_sparc.deb\n Size/MD5 checksum: 7153228 566328488d67a3843b04689d76f0253d\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_sparc.deb\n Size/MD5 checksum: 47714 551a6f9a790b301d63c856ecab13be75\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb\n Size/MD5 checksum: 7013384 3915c6846d5ffce6e321b7e40006cb66\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_sparc.deb\n Size/MD5 checksum: 1797430 b0bd228090c8923d08c9b8ee84a1edb8\n http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_sparc.deb\n Size/MD5 checksum: 25425084 a9934459b8cde72354ffc463b2ec140f\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.6 (GNU/Linux)\n\niD8DBQFHnjjKXm3vHE4uyloRApi/AKCLKlM616TTchb0zEQ8K4cOCdgZhwCffa1J\noQ57J3yhzeNDDwqXdxLvhxM=\n=6ogr\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2008-0226" }, { "db": "CERT/CC", "id": "VU#442845" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "BID", "id": "27140" }, { "db": "VULHUB", "id": "VHN-30351" }, { "db": "VULMON", "id": "CVE-2008-0226" }, { "db": "PACKETSTORM", "id": "68366" }, { "db": "PACKETSTORM", "id": "64766" }, { "db": "PACKETSTORM", "id": "38388" }, { "db": "PACKETSTORM", "id": "65137" }, { "db": "PACKETSTORM", "id": "63104" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=16849", "trust": 0.3, "type": "exploit" }, { "reference": "https://www.scap.org.cn/vuln/vhn-30351", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-30351" }, { "db": "VULMON", "id": "CVE-2008-0226" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2008-0226", "trust": 3.3 }, { "db": "BID", "id": "27140", "trust": 2.9 }, { "db": "SECUNIA", "id": "28419", "trust": 2.6 }, { "db": "SECUNIA", "id": "28324", "trust": 2.6 }, { "db": "SECUNIA", "id": "29443", "trust": 1.8 }, { "db": "SECUNIA", "id": "32222", "trust": 1.8 }, { "db": "SECUNIA", "id": "28597", "trust": 1.8 }, { "db": "BID", "id": "31681", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-2780", "trust": 1.8 }, { "db": "VUPEN", "id": "ADV-2008-0560", "trust": 1.8 }, { "db": "SREASON", "id": "3531", "trust": 1.8 }, { "db": "SECUNIA", "id": "15895", "trust": 0.9 }, { "db": "SECUNIA", "id": "15810", "trust": 0.8 }, { "db": "SECUNIA", "id": "15922", "trust": 0.8 }, { "db": "SECUNIA", "id": "15852", "trust": 0.8 }, { "db": "SECUNIA", "id": "15855", "trust": 0.8 }, { "db": "SECUNIA", "id": "15861", "trust": 0.8 }, { "db": "SECUNIA", "id": "15862", "trust": 0.8 }, { "db": "SECUNIA", "id": "15872", "trust": 0.8 }, { "db": "SECUNIA", "id": "15883", "trust": 0.8 }, { "db": "SECUNIA", "id": "15884", "trust": 0.8 }, { "db": "BID", "id": "14088", "trust": 0.8 }, { "db": "SECTRACK", "id": "1014327", "trust": 0.8 }, { "db": "CERT/CC", "id": "VU#442845", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2008-001045", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200801-154", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "63104", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "68366", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "16849", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "85678", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "82247", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16701", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "9953", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71206", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-67003", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-30351", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2008-0226", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "64766", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "38388", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "65137", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#442845" }, { "db": "VULHUB", "id": "VHN-30351" }, { "db": "VULMON", "id": "CVE-2008-0226" }, { "db": "BID", "id": "27140" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "PACKETSTORM", "id": "68366" }, { "db": "PACKETSTORM", "id": "64766" }, { "db": "PACKETSTORM", "id": "38388" }, { "db": "PACKETSTORM", "id": "65137" }, { "db": "PACKETSTORM", "id": "63104" }, { "db": "CNNVD", "id": "CNNVD-200801-154" }, { "db": "NVD", "id": "CVE-2008-0226" } ] }, "id": "VAR-200801-0204", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-30351" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:25:13.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT3216", "trust": 0.8, "url": "http://support.apple.com/kb/ht3216" }, { "title": "HT3216", "trust": 0.8, "url": "http://support.apple.com/kb/ht3216?viewlocale=ja_jp" }, { "title": "releasenotes-es-5-0-54a", "trust": 0.8, "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-54a.html" }, { "title": "releasenotes-es-5-0-50sp1a", "trust": 0.8, "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-50sp1a.html" }, { "title": "Changes in MySQL 5.1.23", "trust": 0.8, "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "title": "releasenotes-cs-5-0-51a", "trust": 0.8, "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51a.html" }, { "title": "Debian Security Advisories: DSA-1478-1 mysql-dfsg-5.0 -- buffer overflows", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=2b2cb23a9e6fe80baeb726ee71987169" }, { "title": "Ubuntu Security Notice: mysql-dfsg-5.0 regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-588-2" }, { "title": "Ubuntu Security Notice: mysql-dfsg-5.0 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-588-1" }, { "title": "", "trust": 0.1, "url": "https://github.com/dbutter/whitehat_public " } ], "sources": [ { "db": "VULMON", "id": "CVE-2008-0226" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-30351" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "NVD", "id": "CVE-2008-0226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://www.securityfocus.com/bid/27140" }, { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2008/oct/msg00001.html" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/31681" }, { "trust": 1.8, "url": "http://www.securityfocus.com/archive/1/485810/100/0/threaded" }, { "trust": 1.8, "url": "http://www.securityfocus.com/archive/1/485811/100/0/threaded" }, { "trust": 1.8, "url": "http://bugs.mysql.com/33814" }, { "trust": 1.8, "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html" }, { "trust": 1.8, "url": "http://support.apple.com/kb/ht3216" }, { "trust": 1.8, "url": "http://www.debian.org/security/2008/dsa-1478" }, { "trust": 1.8, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2008:150" }, { "trust": 1.8, "url": "http://secunia.com/advisories/28324" }, { "trust": 1.8, "url": "http://secunia.com/advisories/28419" }, { "trust": 1.8, "url": "http://secunia.com/advisories/28597" }, { "trust": 1.8, "url": "http://secunia.com/advisories/29443" }, { "trust": 1.8, "url": "http://secunia.com/advisories/32222" }, { "trust": 1.8, "url": "http://securityreason.com/securityalert/3531" }, { "trust": 1.8, "url": "http://www.ubuntu.com/usn/usn-588-1" }, { "trust": 1.8, "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "trust": 1.8, "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "trust": 1.8, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39431" }, { "trust": 1.8, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39429" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15895/" }, { "trust": 0.9, "url": "http://secunia.com/advisories/15852/" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0226" }, { "trust": 0.8, "url": "http://www.hardened-php.net/advisory-022005.php" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15861/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15862/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15884/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15883/" }, { "trust": 0.8, "url": "http://news.postnuke.com/modules.php?op=modload\u0026name=news\u0026file=article\u0026sid=2699" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15855/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15810/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15872/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/15922/" }, { "trust": 0.8, "url": "http://securitytracker.com/alerts/2005/jun/1014327.html" }, { "trust": 0.8, "url": "http://www.gulftech.org/?node=research\u0026article_id=00088-07022005" }, { "trust": 0.8, "url": "http://www.gulftech.org/?node=research\u0026article_id=00087-07012005" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/14088" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2008/0560" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-0226" }, { "trust": 0.8, "url": "http://secunia.com/advisories/28419/" }, { "trust": 0.8, "url": "http://secunia.com/advisories/28324/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0226" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-0227" }, { "trust": 0.3, "url": "http://yassl.com/" }, { "trust": 0.3, "url": "/archive/1/485810" }, { "trust": 0.3, "url": "/archive/1/485811" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2006-7232" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-2692" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2007-6303" }, { "trust": 0.2, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22.orig.tar.gz" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.debian.org/security/./dsa-1478" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/16849/" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/modules/exploit/linux/mysql/mysql_yassl_hello" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/588-2/" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0227" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2079" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-2079" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45-1ubuntu3.3.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.38-0ubuntu1.4_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.45-1ubuntu3.3.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a-9ubuntu2.4.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.8_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.24a-9ubuntu2.4_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38-0ubuntu1.4.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.24a-9ubuntu2.4_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.24a-9ubuntu2.4.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38-0ubuntu1.4.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.38-0ubuntu1.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.8_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.45-1ubuntu3.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.45-1ubuntu3.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.24a-9ubuntu2.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.45-1ubuntu3.3_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.8_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.8.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.38-0ubuntu1.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.38.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.24a-9ubuntu2.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.38-0ubuntu1.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.24a-9ubuntu2.4_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.45-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.45-1ubuntu3.3_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.8.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.38-0ubuntu1.4_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.45-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.24a-9ubuntu2.4_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.24a-9ubuntu2.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.38-0ubuntu1.4_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.8_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.38-0ubuntu1.4_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.45-1ubuntu3.3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.38-0ubuntu1.4_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.8_powerpc.deb" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/product/3699/" }, { "trust": 0.1, "url": "http://sourceforge.net/project/showfiles.php?group_id=66479" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client_5.0.22-0ubuntu6.06.9_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.diff.gz" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-common_5.0.22-0ubuntu6.06.9_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.22-0ubuntu6.06.9_i386.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_powerpc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.22-0ubuntu6.06.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_amd64.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.22-0ubuntu6.06.9.dsc" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_sparc.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server_5.0.22-0ubuntu6.06.9_all.deb" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.22-0ubuntu6.06.9_i386.deb" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/209699" }, { "trust": 0.1, "url": "http://security.ubuntu.com/ubuntu/pool/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.22-0ubuntu6.06.9_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-common_5.0.32-7etch5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_i386.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server_5.0.32-7etch5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32-7etch5.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client_5.0.32-7etch5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-dfsg-5.0_5.0.32.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_alpha.deb" }, { "trust": 0.1, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_alpha.deb" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-client-5.0_5.0.32-7etch5_amd64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-5.0_5.0.32-7etch5_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15off_5.0.32-7etch5_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/mysql-server-4.1_5.0.32-7etch5_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/m/mysql-dfsg-5.0/libmysqlclient15-dev_5.0.32-7etch5_arm.deb" } ], "sources": [ { "db": "CERT/CC", "id": "VU#442845" }, { "db": "VULHUB", "id": "VHN-30351" }, { "db": "VULMON", "id": "CVE-2008-0226" }, { "db": "BID", "id": "27140" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "PACKETSTORM", "id": "68366" }, { "db": "PACKETSTORM", "id": "64766" }, { "db": "PACKETSTORM", "id": "38388" }, { "db": "PACKETSTORM", "id": "65137" }, { "db": "PACKETSTORM", "id": "63104" }, { "db": "CNNVD", "id": "CNNVD-200801-154" }, { "db": "NVD", "id": "CVE-2008-0226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#442845" }, { "db": "VULHUB", "id": "VHN-30351" }, { "db": "VULMON", "id": "CVE-2008-0226" }, { "db": "BID", "id": "27140" }, { "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "db": "PACKETSTORM", "id": "68366" }, { "db": "PACKETSTORM", "id": "64766" }, { "db": "PACKETSTORM", "id": "38388" }, { "db": "PACKETSTORM", "id": "65137" }, { "db": "PACKETSTORM", "id": "63104" }, { "db": "CNNVD", "id": "CNNVD-200801-154" }, { "db": "NVD", "id": "CVE-2008-0226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-07-06T00:00:00", "db": "CERT/CC", "id": "VU#442845" }, { "date": "2008-01-10T00:00:00", "db": "VULHUB", "id": "VHN-30351" }, { "date": "2008-01-10T00:00:00", "db": "VULMON", "id": "CVE-2008-0226" }, { "date": "2008-01-04T00:00:00", "db": "BID", "id": "27140" }, { "date": "2008-02-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "date": "2008-07-21T19:49:13", "db": "PACKETSTORM", "id": "68366" }, { "date": "2008-03-20T20:58:07", "db": "PACKETSTORM", "id": "64766" }, { "date": "2005-07-01T23:31:00", "db": "PACKETSTORM", "id": "38388" }, { "date": "2008-04-03T05:44:58", "db": "PACKETSTORM", "id": "65137" }, { "date": "2008-01-30T03:19:05", "db": "PACKETSTORM", "id": "63104" }, { "date": "2007-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200801-154" }, { "date": "2008-01-10T23:46:00", "db": "NVD", "id": "CVE-2008-0226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2007-03-09T00:00:00", "db": "CERT/CC", "id": "VU#442845" }, { "date": "2019-12-17T00:00:00", "db": "VULHUB", "id": "VHN-30351" }, { "date": "2019-12-17T00:00:00", "db": "VULMON", "id": "CVE-2008-0226" }, { "date": "2010-01-28T05:21:00", "db": "BID", "id": "27140" }, { "date": "2010-02-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2008-001045" }, { "date": "2019-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200801-154" }, { "date": "2019-12-17T20:26:08.287000", "db": "NVD", "id": "CVE-2008-0226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "68366" }, { "db": "PACKETSTORM", "id": "64766" }, { "db": "CNNVD", "id": "CNNVD-200801-154" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple PHP XML-RPC implementations vulnerable to code injection", "sources": [ { "db": "CERT/CC", "id": "VU#442845" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200801-154" } ], "trust": 0.6 } }