All the vulnerabilites related to mysql - mysql_server
cve-2007-5969
Vulnerability from cvelistv5
Published
2007-12-10 19:00
Modified
2024-08-07 15:47
Severity ?
EPSS score ?
Summary
MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "28343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28343" }, { "name": "GLSA-200804-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29706" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.mysql.com/32111" }, { "name": "oval:org.mitre.oval:def:10509", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/31681" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" }, { "name": "DSA-1451", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2008/dsa-1451" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "name": "1019060", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019060" }, { "name": "ADV-2007-4142", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4142" }, { "name": "USN-559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/559-1/" }, { "name": "20080117 rPSA-2008-0018-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/486477/100/0/threaded" }, { "name": "ADV-2008-1000", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/1000/references" }, { "name": "SSA:2007-348-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "name": "ADV-2008-0560", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "name": "26765", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26765" }, { "name": "FEDORA-2007-4465", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "28040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28040" }, { "name": "RHSA-2007:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "28099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28099" }, { "name": "28559", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28559" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/32222" }, { "name": "27981", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27981" }, { "name": "ADV-2007-4198", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "FEDORA-2007-4471", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "[Announcements] 20071206 MySQL 5.0.51 has been released", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.mysql.com/announce/495" }, { "name": "RHSA-2007:1155", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "name": "28108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28108" }, { "name": "28025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28025" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://forums.mysql.com/read.php?3%2C186931%2C186931" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28128" }, { "name": "MDKSA-2007:243", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "name": "28063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3216" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://issues.rpath.com/browse/RPL-1999" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "28343", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28343" }, { "name": "GLSA-200804-04", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29706" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.mysql.com/32111" }, { "name": "oval:org.mitre.oval:def:10509", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" }, { "name": "31681", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/31681" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" }, { "name": "DSA-1451", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2008/dsa-1451" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "name": "1019060", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019060" }, { "name": "ADV-2007-4142", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4142" }, { "name": "USN-559-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/559-1/" }, { "name": "20080117 rPSA-2008-0018-1 mysql mysql-bench mysql-server", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/486477/100/0/threaded" }, { "name": "ADV-2008-1000", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/1000/references" }, { "name": "SSA:2007-348-01", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "name": "ADV-2008-0560", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "name": "26765", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26765" }, { "name": "FEDORA-2007-4465", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "28040", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28040" }, { "name": "RHSA-2007:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "28099", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28099" }, { "name": "28559", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28559" }, { "name": "32222", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/32222" }, { "name": "27981", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27981" }, { "name": "ADV-2007-4198", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "FEDORA-2007-4471", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "[Announcements] 20071206 MySQL 5.0.51 has been released", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.mysql.com/announce/495" }, { "name": "RHSA-2007:1155", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "name": "28108", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28108" }, { "name": "28025", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28025" }, { "name": "ADV-2008-2780", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://forums.mysql.com/read.php?3%2C186931%2C186931" }, { "name": "28838", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28128" }, { "name": "MDKSA-2007:243", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "name": "28063", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "APPLE-SA-2008-10-09", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3216" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://issues.rpath.com/browse/RPL-1999" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "28343", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28343" }, { "name": "GLSA-200804-04", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "name": "29706", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29706" }, { "name": "http://bugs.mysql.com/32111", "refsource": "CONFIRM", "url": "http://bugs.mysql.com/32111" }, { "name": "oval:org.mitre.oval:def:10509", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" }, { "name": "31681", "refsource": "BID", "url": "http://www.securityfocus.com/bid/31681" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" }, { "name": "DSA-1451", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2008/dsa-1451" }, { "name": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "name": "1019060", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019060" }, { "name": "ADV-2007-4142", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4142" }, { "name": "USN-559-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/559-1/" }, { "name": "20080117 rPSA-2008-0018-1 mysql mysql-bench mysql-server", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486477/100/0/threaded" }, { "name": "ADV-2008-1000", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/1000/references" }, { "name": "SSA:2007-348-01", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "name": "ADV-2008-0560", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "name": "26765", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26765" }, { "name": "FEDORA-2007-4465", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "name": "28040", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28040" }, { "name": "RHSA-2007:1157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "name": "28099", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28099" }, { "name": "28559", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28559" }, { "name": "32222", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/32222" }, { "name": "27981", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27981" }, { "name": "ADV-2007-4198", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "name": "FEDORA-2007-4471", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "name": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html", "refsource": "CONFIRM", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "name": "[Announcements] 20071206 MySQL 5.0.51 has been released", "refsource": "MLIST", "url": "http://lists.mysql.com/announce/495" }, { "name": "RHSA-2007:1155", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "name": "28108", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28108" }, { "name": "28025", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28025" }, { "name": "ADV-2008-2780", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "name": "http://forums.mysql.com/read.php?3,186931,186931", "refsource": "CONFIRM", "url": "http://forums.mysql.com/read.php?3,186931,186931" }, { "name": "28838", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28838" }, { "name": "28128", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28128" }, { "name": "MDKSA-2007:243", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "name": "28063", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28063" }, { "name": "SUSE-SR:2008:003", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "name": "APPLE-SA-2008-10-09", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT3216", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3216" }, { "name": "https://issues.rpath.com/browse/RPL-1999", "refsource": "CONFIRM", "url": "https://issues.rpath.com/browse/RPL-1999" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5969", "datePublished": "2007-12-10T19:00:00", "dateReserved": "2007-11-14T00:00:00", "dateUpdated": "2024-08-07T15:47:00.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-1696
Vulnerability from cvelistv5
Published
2012-05-03 22:00
Modified
2024-08-06 19:08
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
References
▼ | URL | Tags |
---|---|---|
http://secunia.com/advisories/53372 | third-party-advisory, x_refsource_SECUNIA | |
http://security.gentoo.org/glsa/glsa-201308-06.xml | vendor-advisory, x_refsource_GENTOO | |
http://www.securityfocus.com/bid/53071 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id?1026934 | vdb-entry, x_refsource_SECTRACK | |
http://secunia.com/advisories/48890 | third-party-advisory, x_refsource_SECUNIA | |
http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html | x_refsource_CONFIRM | |
http://secunia.com/advisories/49179 | third-party-advisory, x_refsource_SECUNIA | |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | vendor-advisory, x_refsource_MANDRIVA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:08:38.184Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "53071", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53071" }, { "name": "1026934", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48890" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-06T21:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "53372", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "53071", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53071" }, { "name": "1026934", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48890" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2012-1696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "53372", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53372" }, { "name": "GLSA-201308-06", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "name": "53071", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53071" }, { "name": "1026934", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026934" }, { "name": "48890", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48890" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "name": "49179", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49179" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2012-1696", "datePublished": "2012-05-03T22:00:00", "dateReserved": "2012-03-16T00:00:00", "dateUpdated": "2024-08-06T19:08:38.184Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-05-03 22:55
Modified
2024-11-21 01:37
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFEDB808-A8D8-403E-9103-AB486C793EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AAD13-3CA1-4543-834B-39FB53D4462D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FB1CEA0B-1234-4166-BD32-CCBB4016A9BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "ADBEDF5A-5205-4012-B9B8-0FA304E7119A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "0EF35900-4051-4E07-9BFA-347BEAB8AB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "8AC969A5-52CC-44F2-A929-DE559A5D7624", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5A4D224C-8ABF-41A0-A7BE-C10C2387DE95", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "3DD36E9E-89A0-42C2-AC50-7A5BC53B3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:4.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "C93CE88F-2941-4A08-9472-359CF214F81C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DC198CDB-CAC0-41DD-9FCD-42536E7FE11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B77A2761-2B44-4061-9C29-A54F90A1AD83", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5B3AD851-056F-4E57-B85B-4AC5A5A20C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FD24EA8C-4FCA-4F40-B2EA-7DFA49432483", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "754B78F2-A03C-40BE-812B-F5E57B93D20B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "575039BD-A8B6-4459-B5F0-F220A94650EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "542B23CB-7535-4EF7-B926-466A5161A0D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "45E686C3-4100-465C-9F45-068580B496E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "6E9F09D8-6FAE-4A5B-AE04-248CD52C5FF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "DB618DB2-6B00-4E99-8232-937D2C51986B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "665E063D-355D-4A5A-A05F-36BF582DE36F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F4C6CD84-EA5D-451F-AFC3-5F7094F0017D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*", "matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*", "matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*", "matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*", "matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*", "matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "78D57F50-6907-4F3A-B6C8-A7F96191E57C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "2AA549DB-8870-41C2-881A-018C1FA66A9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "85C4F943-4457-43CB-BCD4-89A593446877", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1F9345D2-DFFC-4932-B967-996363D5556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "A950B554-660F-474E-A0E0-55EAE4CF0ECC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "0E77E350-47C9-4286-8B2E-2021974F2AE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "BB79AEDA-C256-4B5C-953F-5C8BFFF80612", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "2D6F573E-B1E5-4AB3-BEA7-130EF8AD51C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "62D4CC90-D892-4E1D-A6D7-9A50FAF9466C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "D211EF2D-AF05-441E-8C6C-7F3CB4AFC417", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "2A79BEFA-B205-4C94-9575-EB970823B935", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "16939E17-0791-4B50-A6E1-4A2FF3C02109", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "0D39E098-FBFC-42EC-835B-AB487807D176", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "902F6029-CB42-4A3B-9D9B-4F5134871685", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "7428EF7D-3ECA-4C54-A945-AD03CA3EEA49", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "798A89AA-4CD7-4402-9B14-B45970022C1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "879DEFCF-B345-41ED-8A2E-531FBD7A2FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "8313D34E-CE00-4B0B-B30F-9E2591BD515A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "E0E05202-0E64-4698-970A-DCF665E0E9A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "4C85219E-C93F-4DCC-9507-AD6B00CAD687", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "DC835BFC-8AE7-4A01-99C1-C7EFDBFA8A16", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_community_server:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A022751-FE6D-4C5D-AB02-22C44D7E6B1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "BB22F327-7795-4B25-B40E-5684F2A5B0BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A36F82C-6EBF-497B-9C20-AFB2007AA684", "versionEndIncluding": "5.5.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20:*:*:*:*:*:*:*", "matchCriteriaId": "578BA199-EF04-4595-AFDE-54FD66B7FC39", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.20.32a:*:*:*:*:*:*:*", "matchCriteriaId": "B270BC3E-FCB8-4E85-A069-A6AA3D348E1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*", "matchCriteriaId": "B82E464F-3871-40C7-A758-B81582D193AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22:*:*:*:*:*:*:*", "matchCriteriaId": "05B7E2C5-6139-47F9-A310-F2BC0EF83942", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*", "matchCriteriaId": "C883DB55-0CAC-462A-912B-69E9E7E1C79C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*", "matchCriteriaId": "45AD5549-07DC-43DA-B277-D7BF16ABE4E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.28:*:*:*:*:*:*:*", "matchCriteriaId": "787CB28C-74C6-4356-8AB3-4183CD941EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*", "matchCriteriaId": "C30459B9-0FAC-48DF-9601-AAD1A028846F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*", "matchCriteriaId": "86DC48D3-09F1-48BD-A783-0549D4D5E8B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.22.32:*:*:*:*:*:*:*", "matchCriteriaId": "209E0C63-FC71-4E19-B3D5-BCB71A758252", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23:*:*:*:*:*:*:*", "matchCriteriaId": "48DBBAC9-AA05-409F-82B2-A552A3417E45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "EA087258-8A5B-472E-B120-9B56415F8869", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.1:*:*:*:*:*:*:*", "matchCriteriaId": "204CF85D-DFAD-4052-B24A-DCE09B32426E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.2:*:*:*:*:*:*:*", "matchCriteriaId": "268CDE97-C837-482A-BB16-77662C45074C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.3:*:*:*:*:*:*:*", "matchCriteriaId": "0E04B7CC-9E17-47AB-8923-A4DBD24119FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.4:*:*:*:*:*:*:*", "matchCriteriaId": "E441A8AB-8057-4C0F-A2D8-02CDB125B9CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.5:*:*:*:*:*:*:*", "matchCriteriaId": "B0BE4B79-BF2A-4323-B337-62B388FCF9D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.6:*:*:*:*:*:*:*", "matchCriteriaId": "5B78C9D8-E6BC-4D80-8C29-219C1F151570", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.7:*:*:*:*:*:*:*", "matchCriteriaId": "72A7DE48-60E6-42FE-8986-0DB1647C1BFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*", "matchCriteriaId": "18E35942-7E70-468E-BA15-97CA5086C1B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*", "matchCriteriaId": "CCB886BB-EA7C-4618-9029-BB16A45A4301", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*", "matchCriteriaId": "56EC4832-82D1-4E57-86DA-8918CA006723", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.11:*:*:*:*:*:*:*", "matchCriteriaId": "01D5DFB7-1AA6-468D-A077-5BB4B32C92B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.12:*:*:*:*:*:*:*", "matchCriteriaId": "4C786D54-7DEC-41B8-A778-BED9DA66C3C1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.13:*:*:*:*:*:*:*", "matchCriteriaId": "FB0F32D6-B2A9-4AC3-A4F9-E4A291AEC91A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.14:*:*:*:*:*:*:*", "matchCriteriaId": "B1BD316B-5855-462D-B378-6AAF9817F23D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.15:*:*:*:*:*:*:*", "matchCriteriaId": "38D864BB-32A6-44FC-870F-3663E53F2277", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F5BA337-5845-4E3E-8DB5-AAB81A460376", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.17:*:*:*:*:*:*:*", "matchCriteriaId": "3BC06D07-8C16-48D4-A95E-8F40CFAE6514", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.18:*:*:*:*:*:*:*", "matchCriteriaId": "1D1B9CEC-580F-4143-B111-032195BCC760", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.19:*:*:*:*:*:*:*", "matchCriteriaId": "2F41E62F-A606-4842-985C-2B349C405E34", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.20:beta:*:*:*:*:*:*", "matchCriteriaId": "9EF1E839-E1C9-4A13-A6BA-6F8C56FDF148", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.21:*:*:*:*:*:*:*", "matchCriteriaId": "692E4E06-D559-4735-AED5-CE9E572CF608", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.22:*:*:*:*:*:*:*", "matchCriteriaId": "92A42D3C-2539-469A-81BD-8306CD7E1A12", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.23:*:*:*:*:*:*:*", "matchCriteriaId": "8060F90A-968A-45EB-9CA2-E83E8D8F7BC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.24:*:*:*:*:*:*:*", "matchCriteriaId": "D3BCEB43-67D4-4711-8C30-4D2D93159EDA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.25:*:*:*:*:*:*:*", "matchCriteriaId": "362893B4-9BC1-4584-ACD5-08878A19E3C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.26:*:*:*:*:*:*:*", "matchCriteriaId": "FD940715-318E-44C1-8613-FEBFB8F1741A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.27:*:*:*:*:*:*:*", "matchCriteriaId": "167130D3-2AD2-4B82-B805-6A0BA45C4DCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:*:*:*:*:*:*:*", "matchCriteriaId": "17187451-7715-464D-9C7B-3F949345CF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.28:gamma:*:*:*:*:*:*", "matchCriteriaId": "1BFFFBBE-E604-4BCB-A143-E26CD91C0B51", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.29:*:*:*:*:*:*:*", "matchCriteriaId": "CE3658E1-B451-4B8B-A21A-3D66359D21DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.30:*:*:*:*:*:*:*", "matchCriteriaId": "81F0E7D8-0713-4E9C-B91A-DA5EB314DEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.31:*:*:*:*:*:*:*", "matchCriteriaId": "041AD718-39A7-4B13-90C5-680743B1C982", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.32:*:*:*:*:*:*:*", "matchCriteriaId": "EA2F4EA8-64A3-4E11-A6A3-5179738157D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.33:*:*:*:*:*:*:*", "matchCriteriaId": "067774E4-0704-4F5D-9B46-4DE19FE51163", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.34:*:*:*:*:*:*:*", "matchCriteriaId": "AD26FA75-C3C5-434C-9A82-E5F798A8E47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.35:*:*:*:*:*:*:*", "matchCriteriaId": "77B463E6-DAD6-4013-8095-F0153F8B335F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.36:*:*:*:*:*:*:*", "matchCriteriaId": "C406CBD9-2656-4EC8-87FB-5E8A7F1D690F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.37:*:*:*:*:*:*:*", "matchCriteriaId": "DA0C0EE5-B2AA-4862-B144-24733CC86A2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.38:*:*:*:*:*:*:*", "matchCriteriaId": "536F109A-7932-4424-889E-02922D8B783D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.39:*:*:*:*:*:*:*", "matchCriteriaId": "036AE068-C061-49B1-95D1-98A09A79EE25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.40:*:*:*:*:*:*:*", "matchCriteriaId": "E7A83184-F554-42C0-8162-B484CBAD09D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.41:*:*:*:*:*:*:*", "matchCriteriaId": "DC229C7C-BF4F-473B-BB01-BBD96CD06D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.42:*:*:*:*:*:*:*", "matchCriteriaId": "A9244622-781A-46AE-866D-0EDDE5323048", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.43:*:*:*:*:*:*:*", "matchCriteriaId": "6B99D1B4-9C0F-4303-A00C-50D88CCB8D3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.44:*:*:*:*:*:*:*", "matchCriteriaId": "FA85DD18-19D9-4BF8-8420-DEA24AE44046", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.45:*:*:*:*:*:*:*", "matchCriteriaId": "670C3F10-A811-43D0-B762-5791D41C8B78", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.46:*:*:*:*:*:*:*", "matchCriteriaId": "7F379312-B95D-4C9B-918F-6A57B12EB5A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.47:*:*:*:*:*:*:*", "matchCriteriaId": "C36F606D-59B6-4FA0-8785-3B14592FE9CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.48:*:*:*:*:*:*:*", "matchCriteriaId": "2681F9FF-5899-4EFA-85A3-CEAB4402C786", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.49:*:*:*:*:*:*:*", "matchCriteriaId": "9B13E0D9-0868-493F-A7EA-4A9E93CC4FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.50:*:*:*:*:*:*:*", "matchCriteriaId": "11A503C5-F2B8-4AFF-80F9-E035BAA68F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.51:*:*:*:*:*:*:*", "matchCriteriaId": "64B5AA62-1AFC-45E4-BC47-91BC852B3F0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.52:*:*:*:*:*:*:*", "matchCriteriaId": "50FC2146-5BC0-4CA6-8700-5877C01B777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53:*:*:*:*:*:*:*", "matchCriteriaId": "F79AFBCE-FFF7-4348-BE17-42A7978E17E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.53a:*:*:*:*:*:*:*", "matchCriteriaId": "6A3C056E-EEB9-4B95-A155-F71B80B9695D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54:*:*:*:*:*:*:*", "matchCriteriaId": "C1AB3865-4ABC-4B5A-8C4F-65C6E5B2E956", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.54a:*:*:*:*:*:*:*", "matchCriteriaId": "2EFB2D10-E255-4DD3-BF03-217803CDED24", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.55:*:*:*:*:*:*:*", "matchCriteriaId": "436D90B0-C839-4B9F-853D-51C34459A11F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.56:*:*:*:*:*:*:*", "matchCriteriaId": "F3535453-E7DC-4561-BB35-32DFF78E451C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.57:*:*:*:*:*:*:*", "matchCriteriaId": "48A46F3F-7A97-4AE5-885B-15E25BC575C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.58:*:*:*:*:*:*:*", "matchCriteriaId": "37512B4B-C428-4D30-AAF3-9557C7257967", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:3.23.59:*:*:*:*:*:*:*", "matchCriteriaId": "75B1527A-5039-470B-87DC-B02F557364A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "41BEAD26-ADDC-4FC6-A493-584315183936", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "153E8DFB-4197-4117-87C6-C0FBE3C05600", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "765BF98E-7AB1-45EA-9935-2C311E621211", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "DCDCB80C-60B8-468E-A689-2C9DFF1F51C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "22408224-0634-4CC6-888F-892E9D932CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2B2646B4-593E-4AC9-8292-1AD805632DC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.5a:*:*:*:*:*:*:*", "matchCriteriaId": "CD959AEC-EE71-4E86-9AD0-ED6FF45AC848", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "E30EC061-A04C-4402-91A0-B7E8DA9DBA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB5E12B3-F6CA-48CE-96C9-9B63EDB91C57", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.7:gamma:*:*:*:*:*:*", "matchCriteriaId": "4D57E557-7F6D-4618-86AC-B10C08341900", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "3ECE1A40-0603-421E-BCCF-111EC3C2BCE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.8:gamma:*:*:*:*:*:*", "matchCriteriaId": "B657610A-8EDB-407B-A81F-C3CDF2EF6ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "8EC10CD2-B9A3-46DD-839E-C7FB6647155F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.9:gamma:*:*:*:*:*:*", "matchCriteriaId": "E4D5D4B9-B831-4DDD-8FDD-3D14F167822A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "5EC21395-4C78-4343-9452-578B24C2656D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "21BC82AF-5E80-4AE4-A765-9D3725D9E5F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.11:gamma:*:*:*:*:*:*", "matchCriteriaId": "8CF2E25B-8689-4396-9C2B-99EEF4AB02BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "5032D74E-CC8D-4217-AEF0-98DCD1820AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A46FEF7C-18DD-4C64-AFA3-0626A8CE2B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "B3340604-0D38-4494-847B-E9E8B0026A28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "EC117BF1-3127-477A-9500-C9A32596ED8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "DC54D7B3-DC9B-43AC-BE10-565BDF292A88", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "E6A7AC36-4E5D-483B-939E-257FDEDE48EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "FED5BA55-FF4F-4F89-89B1-554624DDA1AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "3C2CEF98-8561-42D2-BCE5-3AAE4DC81ACA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "E00312DA-AB34-4E5B-AB7C-71AA3AD0AC8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "4A0C43BB-81C6-496F-AC7B-61382DE76B71", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "2C9FF055-99BC-4E15-80C8-80FEF3CBA990", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "F6ED2E0A-37C6-4BD2-87B0-FD3E6D0C2108", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.25:*:*:*:*:*:*:*", "matchCriteriaId": "C6132F5E-ADE6-44C2-85BD-17408594789F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.26:*:*:*:*:*:*:*", "matchCriteriaId": "9B6779AC-EF41-46B5-8B26-07FA2537E5B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.0.27:*:*:*:*:*:*:*", "matchCriteriaId": "0F038AF5-C96C-43EE-9D46-1DD8CAF567EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "1D3D4850-19F0-4FAF-B0DE-09ECBE6DCF92", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E24BD3CF-0047-47F8-8B13-E2A6348E3924", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.2:alpha:*:*:*:*:*:*", "matchCriteriaId": "BB7196E5-8483-4872-A78A-8BE7EC551CA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.3:beta:*:*:*:*:*:*", "matchCriteriaId": "14DDA057-D211-42BD-B8AF-F250F1C5B88C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "32CA2F70-77E4-4280-B845-4CE5774162C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "FA788329-9A66-49EA-B7E4-E465C0E7E320", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "66C06765-D153-4D4D-B8CD-DB2E386E082B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "4297E6B7-6C5A-4D52-A66B-F9D1AE17E988", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "141D83A9-89C2-456F-B70D-F274EBE3EAC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "0670E6AA-28B1-4B0C-84F9-F3F9F3E6ABDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "E6769975-47A4-4D0A-9181-F59776D13D38", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "11E942FA-A458-4607-B48D-FCA112AFF1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "0E241159-FAA4-4DCF-AB68-BE36DF95D59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "DB6995B6-B594-454B-BD26-EACFB8241DA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "AC14E107-7C11-4D5B-994B-CCACFD62097E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "E8105AE3-7FF6-43C5-9B47-29ACD4DD7C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:4.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "48BA51FF-B163-4522-8D78-AF9C05D50511", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "4413BB52-6FBD-4C12-8864-ADDC65E45B25", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*", "matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*", "matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*", "matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*", "matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*", "matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*", "matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*", "matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*", "matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*", "matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*", "matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*", "matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*", "matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*", "matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*", "matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*", "matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*", "matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*", "matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*", "matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*", "matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*", "matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*", "matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*", "matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*", "matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*", "matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*", "matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*", "matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*", "matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*", "matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*", "matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*", "matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*", "matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*", "matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*", "matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*", "matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*", "matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*", "matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*", "matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*", "matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*", "matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*", "matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*", "matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*", "matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*", "matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*", "matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*", "matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*", "matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*", "matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*", "matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*", "matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*", "matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*", "matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*", "matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*", "matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*", "matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*", "matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*", "matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*", "matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*", "matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*", "matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*", "matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*", "matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:mysql_connector\\/j:5.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "3FBF02F4-97EE-4300-A7F4-033D190788F3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer." }, { "lang": "es", "value": "Vulnerabilidad no especificada en el componente de servidor MySQL en Oracle MySQL v5.5.19 y anteriores permite a usuarios remotos autenticados afectar a la disponibilidad a trav\u00e9s de vectores desconocidos relacionados con el Optimizador de servidor." } ], "id": "CVE-2012-1696", "lastModified": "2024-11-21T01:37:28.960", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-05-03T22:55:02.637", "references": [ { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/48890" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/49179" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/53372" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "secalert_us@oracle.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securityfocus.com/bid/53071" }, { "source": "secalert_us@oracle.com", "url": "http://www.securitytracker.com/id?1026934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/53372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201308-06.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026934" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-10 19:46
Modified
2024-11-21 00:39
Severity ?
Summary
MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mysql | mysql_server | 5.1.22 | |
mysql | mysql_server | 6.0 | |
mysql | mysql_server | 6.0.1 | |
mysql | mysql_server | 6.0.2 | |
mysql | mysql_server | 6.0.3 | |
mysql | community_server | * | |
mysql | community_server | 5.0.41 | |
mysql | community_server | 5.0.44 | |
mysql | community_server | 5.0.45 | |
mysql | mysql_enterprise_server | 5.0.50 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql_server:5.1.22:*:*:*:*:*:*:*", "matchCriteriaId": "BB22F327-7795-4B25-B40E-5684F2A5B0BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "0714FFD1-72F8-40DA-8BD9-80A160B4EBE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5B02C419-7843-4400-9223-B9632A183FCE", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9FF4637-F6CF-40FD-AE36-EA8B9C1ECBB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:mysql_server:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "4DF9852D-A35F-49A8-9886-49991DD864F2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:community_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED15232-83F0-4A63-8E8B-79B0C2BF80F9", "versionEndIncluding": "5.0.50", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:community_server:5.0.41:*:*:*:*:*:*:*", "matchCriteriaId": "5FAA5C79-6D2D-45BF-A392-0EA4F9D3C727", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:community_server:5.0.44:*:*:*:*:*:*:*", "matchCriteriaId": "9E670333-0E50-42D5-8D67-B1F565FFD59A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mysql:community_server:5.0.45:*:*:*:*:*:*:*", "matchCriteriaId": "9C576BBB-9A3B-4BDD-A362-00F65627284A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mysql:mysql_enterprise_server:5.0.50:*:*:*:*:*:*:*", "matchCriteriaId": "7C003A85-4802-4B55-A7EA-5229A0FDEDB3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file." }, { "lang": "es", "value": "MySQL Community Server versiones 5.0.x anteriores a 5.0.51, Enterprise Server versiones 5.0.x anteriores a 5.0.52, Server versiones 5.1.x anteriores a 5.1.23 y Server versiones 6.0.x anteriores a 6.0.4, cuando una tabla se basa en symlinks creados por medio de las opciones expl\u00edcitas DATA DIRECTORY e INDEX DIRECTORY, permite a los usuarios remotos autenticados sobrescribir la informaci\u00f3n de la tabla del sistema y alcanzar privilegios por medio de una sentencia RENAME TABLE que cambia el symlink para que apunte hacia un archivo existente." } ], "id": "CVE-2007-5969", "lastModified": "2024-11-21T00:39:04.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:H/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-12-10T19:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://bugs.mysql.com/32111" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" }, { "source": "cve@mitre.org", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "source": "cve@mitre.org", "url": "http://forums.mysql.com/read.php?3%2C186931%2C186931" }, { "source": "cve@mitre.org", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.mysql.com/announce/495" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27981" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28025" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28040" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28063" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28099" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28108" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28128" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28343" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28559" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29706" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32222" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "source": "cve@mitre.org", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "source": "cve@mitre.org", "url": "http://support.apple.com/kb/HT3216" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2008/dsa-1451" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/486477/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26765" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019060" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4142" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1000/references" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "cve@mitre.org", "url": "https://issues.rpath.com/browse/RPL-1999" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" }, { "source": "cve@mitre.org", "url": "https://usn.ubuntu.com/559-1/" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.mysql.com/32111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://forums.mysql.com/read.php?3%2C186931%2C186931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://lists.mysql.com/announce/495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/27981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28040" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28343" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/28838" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/29706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/32222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200804-04.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.428959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.apple.com/kb/HT3216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2008/dsa-1451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:243" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1155.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2007-1157.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/486477/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26765" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/31681" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/4198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/0560/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/1000/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2008/2780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://issues.rpath.com/browse/RPL-1999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10509" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://usn.ubuntu.com/559-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00467.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00475.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }