All the vulnerabilites related to mysql - mysql_community_server
Vulnerability from fkie_nvd
Published
2008-02-18 23:00
Modified
2024-11-21 00:39
Severity ?
Summary
MySQL Server 5.1.x before 5.1.23 and 6.0.x before 6.0.4 does not check the rights of the entity executing BINLOG, which allows remote authorized users to execute arbitrary BINLOG statements.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D57F50-6907-4F3A-B6C8-A7F96191E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA549DB-8870-41C2-881A-018C1FA66A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C4F943-4457-43CB-BCD4-89A593446877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9345D2-DFFC-4932-B967-996363D5556F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A950B554-660F-474E-A0E0-55EAE4CF0ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E77E350-47C9-4286-8B2E-2021974F2AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB79AEDA-C256-4B5C-953F-5C8BFFF80612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6F573E-B1E5-4AB3-BEA7-130EF8AD51C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D4CC90-D892-4E1D-A6D7-9A50FAF9466C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D211EF2D-AF05-441E-8C6C-7F3CB4AFC417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A79BEFA-B205-4C94-9575-EB970823B935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "16939E17-0791-4B50-A6E1-4A2FF3C02109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D39E098-FBFC-42EC-835B-AB487807D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "902F6029-CB42-4A3B-9D9B-4F5134871685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428EF7D-3ECA-4C54-A945-AD03CA3EEA49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "798A89AA-4CD7-4402-9B14-B45970022C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "879DEFCF-B345-41ED-8A2E-531FBD7A2FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8313D34E-CE00-4B0B-B30F-9E2591BD515A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E05202-0E64-4698-970A-DCF665E0E9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C85219E-C93F-4DCC-9507-AD6B00CAD687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC835BFC-8AE7-4A01-99C1-C7EFDBFA8A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A022751-FE6D-4C5D-AB02-22C44D7E6B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:6.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC3405E4-CFB2-4C28-A064-C5DF930D7265",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F7C8380-7E23-4434-B23E-1885E45D6FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E82B78B-BA41-4054-8ABC-6B11FD550C2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:6.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "682DC73C-2EEC-4939-9BF8-2F9C238374F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MySQL Server 5.1.x before 5.1.23 and 6.0.x before 6.0.4 does not check the rights of the entity executing BINLOG, which allows remote authorized users to execute arbitrary BINLOG statements."
    },
    {
      "lang": "es",
      "value": "MySQL Server 5.1.x antes de 5.1.23 y 6.0.x antes de 6.0.4 no comprueba los privilegios de entidad ejecutando BINLOG, lo que permite a usuarios autorizados remotamente ejecutar sentencias BINLOG de su elecci\u00f3n."
    }
  ],
  "id": "CVE-2007-6313",
  "lastModified": "2024-11-21T00:39:50.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-02-18T23:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.mysql.com/31611"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/43179"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019083"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0560/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.mysql.com/31611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/43179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0560/references"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of MySQL as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2008-02-20T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-05-03 22:55
Modified
2024-11-21 01:37
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
Impacted products
Vendor Product Version
mysql mysql 4.1.0
mysql mysql 4.1.2
mysql mysql 4.1.3
mysql mysql 4.1.8
mysql mysql 4.1.10
mysql mysql 4.1.12
mysql mysql 4.1.13
mysql mysql 4.1.14
mysql mysql 4.1.15
mysql mysql 5.0.0
mysql mysql 5.0.1
mysql mysql 5.0.2
mysql mysql 5.0.3
mysql mysql 5.0.4
mysql mysql 5.0.5
mysql mysql 5.0.10
mysql mysql 5.0.15
mysql mysql 5.0.16
mysql mysql 5.0.17
mysql mysql 5.0.20
mysql mysql 5.0.24
mysql mysql 5.1.5
mysql mysql 5.1.23
mysql mysql 5.1.31
mysql mysql 5.1.32
mysql mysql 5.1.34
mysql mysql 5.1.37
mysql mysql_community_server 5.1.1
mysql mysql_community_server 5.1.2
mysql mysql_community_server 5.1.3
mysql mysql_community_server 5.1.4
mysql mysql_community_server 5.1.5
mysql mysql_community_server 5.1.6
mysql mysql_community_server 5.1.7
mysql mysql_community_server 5.1.8
mysql mysql_community_server 5.1.9
mysql mysql_community_server 5.1.10
mysql mysql_community_server 5.1.11
mysql mysql_community_server 5.1.12
mysql mysql_community_server 5.1.13
mysql mysql_community_server 5.1.14
mysql mysql_community_server 5.1.15
mysql mysql_community_server 5.1.16
mysql mysql_community_server 5.1.17
mysql mysql_community_server 5.1.18
mysql mysql_community_server 5.1.19
mysql mysql_community_server 5.1.20
mysql mysql_community_server 5.1.21
mysql mysql_community_server 5.1.22
mysql mysql_server 5.1.22
oracle mysql *
oracle mysql 3.20
oracle mysql 3.20.32a
oracle mysql 3.21
oracle mysql 3.22
oracle mysql 3.22.26
oracle mysql 3.22.27
oracle mysql 3.22.28
oracle mysql 3.22.29
oracle mysql 3.22.30
oracle mysql 3.22.32
oracle mysql 3.23
oracle mysql 3.23.0
oracle mysql 3.23.1
oracle mysql 3.23.2
oracle mysql 3.23.3
oracle mysql 3.23.4
oracle mysql 3.23.5
oracle mysql 3.23.6
oracle mysql 3.23.7
oracle mysql 3.23.8
oracle mysql 3.23.9
oracle mysql 3.23.10
oracle mysql 3.23.11
oracle mysql 3.23.12
oracle mysql 3.23.13
oracle mysql 3.23.14
oracle mysql 3.23.15
oracle mysql 3.23.16
oracle mysql 3.23.17
oracle mysql 3.23.18
oracle mysql 3.23.19
oracle mysql 3.23.20
oracle mysql 3.23.21
oracle mysql 3.23.22
oracle mysql 3.23.23
oracle mysql 3.23.24
oracle mysql 3.23.25
oracle mysql 3.23.26
oracle mysql 3.23.27
oracle mysql 3.23.28
oracle mysql 3.23.28
oracle mysql 3.23.29
oracle mysql 3.23.30
oracle mysql 3.23.31
oracle mysql 3.23.32
oracle mysql 3.23.33
oracle mysql 3.23.34
oracle mysql 3.23.35
oracle mysql 3.23.36
oracle mysql 3.23.37
oracle mysql 3.23.38
oracle mysql 3.23.39
oracle mysql 3.23.40
oracle mysql 3.23.41
oracle mysql 3.23.42
oracle mysql 3.23.43
oracle mysql 3.23.44
oracle mysql 3.23.45
oracle mysql 3.23.46
oracle mysql 3.23.47
oracle mysql 3.23.48
oracle mysql 3.23.49
oracle mysql 3.23.50
oracle mysql 3.23.51
oracle mysql 3.23.52
oracle mysql 3.23.53
oracle mysql 3.23.53a
oracle mysql 3.23.54
oracle mysql 3.23.54a
oracle mysql 3.23.55
oracle mysql 3.23.56
oracle mysql 3.23.57
oracle mysql 3.23.58
oracle mysql 3.23.59
oracle mysql 4.0.0
oracle mysql 4.0.1
oracle mysql 4.0.2
oracle mysql 4.0.3
oracle mysql 4.0.4
oracle mysql 4.0.5
oracle mysql 4.0.5a
oracle mysql 4.0.6
oracle mysql 4.0.7
oracle mysql 4.0.7
oracle mysql 4.0.8
oracle mysql 4.0.8
oracle mysql 4.0.9
oracle mysql 4.0.9
oracle mysql 4.0.10
oracle mysql 4.0.11
oracle mysql 4.0.11
oracle mysql 4.0.12
oracle mysql 4.0.13
oracle mysql 4.0.14
oracle mysql 4.0.15
oracle mysql 4.0.16
oracle mysql 4.0.17
oracle mysql 4.0.18
oracle mysql 4.0.19
oracle mysql 4.0.20
oracle mysql 4.0.21
oracle mysql 4.0.23
oracle mysql 4.0.24
oracle mysql 4.0.25
oracle mysql 4.0.26
oracle mysql 4.0.27
oracle mysql 4.1.0
oracle mysql 4.1.1
oracle mysql 4.1.2
oracle mysql 4.1.3
oracle mysql 4.1.4
oracle mysql 4.1.5
oracle mysql 4.1.6
oracle mysql 4.1.7
oracle mysql 4.1.9
oracle mysql 4.1.11
oracle mysql 4.1.16
oracle mysql 4.1.17
oracle mysql 4.1.18
oracle mysql 4.1.19
oracle mysql 4.1.20
oracle mysql 4.1.21
oracle mysql 4.1.22
oracle mysql 5.0.41
oracle mysql 5.1
oracle mysql 5.1.1
oracle mysql 5.1.2
oracle mysql 5.1.3
oracle mysql 5.1.4
oracle mysql 5.1.6
oracle mysql 5.1.7
oracle mysql 5.1.8
oracle mysql 5.1.9
oracle mysql 5.1.10
oracle mysql 5.1.11
oracle mysql 5.1.12
oracle mysql 5.1.13
oracle mysql 5.1.14
oracle mysql 5.1.15
oracle mysql 5.1.16
oracle mysql 5.1.17
oracle mysql 5.1.18
oracle mysql 5.1.19
oracle mysql 5.1.20
oracle mysql 5.1.21
oracle mysql 5.1.22
oracle mysql 5.1.23
oracle mysql 5.1.24
oracle mysql 5.1.25
oracle mysql 5.1.26
oracle mysql 5.1.27
oracle mysql 5.1.28
oracle mysql 5.1.29
oracle mysql 5.1.30
oracle mysql 5.1.31
oracle mysql 5.1.33
oracle mysql 5.1.34
oracle mysql 5.1.35
oracle mysql 5.1.36
oracle mysql 5.1.37
oracle mysql 5.1.38
oracle mysql 5.1.39
oracle mysql 5.1.40
oracle mysql 5.1.40
oracle mysql 5.1.41
oracle mysql 5.1.42
oracle mysql 5.1.43
oracle mysql 5.1.43
oracle mysql 5.1.44
oracle mysql 5.1.45
oracle mysql 5.1.46
oracle mysql 5.1.46
oracle mysql 5.1.47
oracle mysql 5.1.48
oracle mysql 5.1.49
oracle mysql 5.1.49
oracle mysql 5.1.50
oracle mysql 5.1.51
oracle mysql 5.1.52
oracle mysql 5.1.52
oracle mysql 5.1.53
oracle mysql 5.1.54
oracle mysql 5.1.55
oracle mysql 5.1.56
oracle mysql 5.1.57
oracle mysql 5.1.58
oracle mysql 5.1.59
oracle mysql 5.1.60
oracle mysql 5.1.61
oracle mysql 5.5.0
oracle mysql 5.5.1
oracle mysql 5.5.2
oracle mysql 5.5.3
oracle mysql 5.5.4
oracle mysql 5.5.5
oracle mysql 5.5.6
oracle mysql 5.5.7
oracle mysql 5.5.8
oracle mysql 5.5.9
oracle mysql 5.5.10
oracle mysql 5.5.11
oracle mysql 5.5.12
oracle mysql 5.5.13
oracle mysql 5.5.14
oracle mysql 5.5.15
oracle mysql 5.5.16
oracle mysql 5.5.17
oracle mysql 5.5.18
oracle mysql 5.5.20
oracle mysql 5.5.21
oracle mysql_connector\/j 5.1.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "78D57F50-6907-4F3A-B6C8-A7F96191E57C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA549DB-8870-41C2-881A-018C1FA66A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C4F943-4457-43CB-BCD4-89A593446877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F9345D2-DFFC-4932-B967-996363D5556F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A950B554-660F-474E-A0E0-55EAE4CF0ECC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E77E350-47C9-4286-8B2E-2021974F2AE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB79AEDA-C256-4B5C-953F-5C8BFFF80612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D6F573E-B1E5-4AB3-BEA7-130EF8AD51C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D4CC90-D892-4E1D-A6D7-9A50FAF9466C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "D211EF2D-AF05-441E-8C6C-7F3CB4AFC417",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A79BEFA-B205-4C94-9575-EB970823B935",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "16939E17-0791-4B50-A6E1-4A2FF3C02109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D39E098-FBFC-42EC-835B-AB487807D176",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "902F6029-CB42-4A3B-9D9B-4F5134871685",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "7428EF7D-3ECA-4C54-A945-AD03CA3EEA49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "798A89AA-4CD7-4402-9B14-B45970022C1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "879DEFCF-B345-41ED-8A2E-531FBD7A2FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "8313D34E-CE00-4B0B-B30F-9E2591BD515A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0E05202-0E64-4698-970A-DCF665E0E9A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C85219E-C93F-4DCC-9507-AD6B00CAD687",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC835BFC-8AE7-4A01-99C1-C7EFDBFA8A16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A022751-FE6D-4C5D-AB02-22C44D7E6B1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB22F327-7795-4B25-B40E-5684F2A5B0BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A36F82C-6EBF-497B-9C20-AFB2007AA684",
              "versionEndIncluding": "5.5.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "578BA199-EF04-4595-AFDE-54FD66B7FC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82E464F-3871-40C7-A758-B81582D193AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "05B7E2C5-6139-47F9-A310-F2BC0EF83942",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*",
              "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*",
              "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "48BA51FF-B163-4522-8D78-AF9C05D50511",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
              "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
              "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
              "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
              "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
              "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
              "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
              "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:oracle:mysql_connector\\/j:5.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FBF02F4-97EE-4300-A7F4-033D190788F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en el componente de servidor MySQL en Oracle MySQL v5.5.19 y anteriores permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con el Optimizador de servidor."
    }
  ],
  "id": "CVE-2012-1696",
  "lastModified": "2024-11-21T01:37:28.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-05-03T22:55:02.637",
  "references": [
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/48890"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "secalert_us@oracle.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securityfocus.com/bid/53071"
    },
    {
      "source": "secalert_us@oracle.com",
      "url": "http://www.securitytracker.com/id?1026934"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/53372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026934"
    }
  ],
  "sourceIdentifier": "secalert_us@oracle.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2007-6313
Vulnerability from cvelistv5
Published
2008-02-18 22:00
Modified
2024-08-07 16:02
Severity ?
Summary
MySQL Server 5.1.x before 5.1.23 and 6.0.x before 6.0.4 does not check the rights of the entity executing BINLOG, which allows remote authorized users to execute arbitrary BINLOG statements.
References
http://osvdb.org/43179vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2008/0560/referencesvdb-entry, x_refsource_VUPEN
http://bugs.mysql.com/31611x_refsource_CONFIRM
http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.htmlx_refsource_CONFIRM
http://www.securitytracker.com/id?1019083vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:02:36.369Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "43179",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/43179"
          },
          {
            "name": "ADV-2008-0560",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0560/references"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.mysql.com/31611"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
          },
          {
            "name": "1019083",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1019083"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MySQL Server 5.1.x before 5.1.23 and 6.0.x before 6.0.4 does not check the rights of the entity executing BINLOG, which allows remote authorized users to execute arbitrary BINLOG statements."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "43179",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/43179"
        },
        {
          "name": "ADV-2008-0560",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0560/references"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.mysql.com/31611"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
        },
        {
          "name": "1019083",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1019083"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-6313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MySQL Server 5.1.x before 5.1.23 and 6.0.x before 6.0.4 does not check the rights of the entity executing BINLOG, which allows remote authorized users to execute arbitrary BINLOG statements."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "43179",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/43179"
            },
            {
              "name": "ADV-2008-0560",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0560/references"
            },
            {
              "name": "http://bugs.mysql.com/31611",
              "refsource": "CONFIRM",
              "url": "http://bugs.mysql.com/31611"
            },
            {
              "name": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html",
              "refsource": "CONFIRM",
              "url": "http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html"
            },
            {
              "name": "1019083",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1019083"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-6313",
    "datePublished": "2008-02-18T22:00:00",
    "dateReserved": "2007-12-11T00:00:00",
    "dateUpdated": "2024-08-07T16:02:36.369Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-1696
Vulnerability from cvelistv5
Published
2012-05-03 22:00
Modified
2024-08-06 19:08
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
References
http://secunia.com/advisories/53372third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201308-06.xmlvendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/53071vdb-entry, x_refsource_BID
http://www.securitytracker.com/id?1026934vdb-entry, x_refsource_SECTRACK
http://secunia.com/advisories/48890third-party-advisory, x_refsource_SECUNIA
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.htmlx_refsource_CONFIRM
http://secunia.com/advisories/49179third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150vendor-advisory, x_refsource_MANDRIVA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:08:38.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "53372",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/53372"
          },
          {
            "name": "GLSA-201308-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
          },
          {
            "name": "53071",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53071"
          },
          {
            "name": "1026934",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026934"
          },
          {
            "name": "48890",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48890"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
          },
          {
            "name": "49179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49179"
          },
          {
            "name": "MDVSA-2013:150",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-06T21:57:01",
        "orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
        "shortName": "oracle"
      },
      "references": [
        {
          "name": "53372",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/53372"
        },
        {
          "name": "GLSA-201308-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
        },
        {
          "name": "53071",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53071"
        },
        {
          "name": "1026934",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026934"
        },
        {
          "name": "48890",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48890"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
        },
        {
          "name": "49179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49179"
        },
        {
          "name": "MDVSA-2013:150",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert_us@oracle.com",
          "ID": "CVE-2012-1696",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "53372",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/53372"
            },
            {
              "name": "GLSA-201308-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
            },
            {
              "name": "53071",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53071"
            },
            {
              "name": "1026934",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026934"
            },
            {
              "name": "48890",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48890"
            },
            {
              "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html",
              "refsource": "CONFIRM",
              "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html"
            },
            {
              "name": "49179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49179"
            },
            {
              "name": "MDVSA-2013:150",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
    "assignerShortName": "oracle",
    "cveId": "CVE-2012-1696",
    "datePublished": "2012-05-03T22:00:00",
    "dateReserved": "2012-03-16T00:00:00",
    "dateUpdated": "2024-08-06T19:08:38.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}