Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-1482
Vulnerability from csaf_certbund
Published
2016-01-19 23:00
Modified
2024-06-30 22:00
Summary
Oracle MySQL: Mehrere Schwachstellen gefährden die Integrität, Vertraulichkeit und Verfügbarkeit
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
MySQL ist ein Open Source Datenbankserver von Oracle.
Angriff
Ein entfernter, authentisierter, entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "MySQL ist ein Open Source Datenbankserver von Oracle.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein entfernter, authentisierter, entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.", title: "Angriff", }, { category: "general", text: "- Linux\n- UNIX\n- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1482 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-1482.json", }, { category: "self", summary: "WID-SEC-2024-1482 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1482", }, { category: "external", summary: "Oracle Critical Patch Update Advisory - January 2016 vom 2016-01-19", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html#AppendixMSQL", }, { category: "external", summary: "Ubuntu Security Notice USN-2881-1 vom 2016-01-26", url: "http://www.ubuntu.com/usn/usn-2881-1/", }, { category: "external", summary: "Debian Security Advisory DSA-3459 vom 2016-01-29", url: "https://www.debian.org/security/2016/dsa-3459", }, { category: "external", summary: "SUSE Security Update SUSE-SU-2016:0348-1 vom 2016-02-05", url: "https://www.suse.com/support/update/announcement/2016/suse-su-20160348-1.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:0705-1 vom 2016-05-02", url: "https://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { category: "external", summary: "Red Hat Security Advisory RHSA-2016:1132-1", url: "http://rhn.redhat.com/errata/RHSA-2016-1132.html", }, { category: "external", summary: "F5 Security Advisory K77508618 vom 2017-05-06", url: "https://support.f5.com/csp/article/K77508618", }, { category: "external", summary: "Amazon Linux Security Advisory ALAS-2016-684 vom 2024-06-29", url: "https://alas.aws.amazon.com/ALAS-2016-684.html", }, ], source_lang: "en-US", title: "Oracle MySQL: Mehrere Schwachstellen gefährden die Integrität, Vertraulichkeit und Verfügbarkeit", tracking: { current_release_date: "2024-06-30T22:00:00.000+00:00", generator: { date: "2024-08-15T18:10:42.547+00:00", engine: { name: "BSI-WID", version: "1.3.5", }, }, id: "WID-SEC-W-2024-1482", initial_release_date: "2016-01-19T23:00:00.000+00:00", revision_history: [ { date: "2016-01-19T23:00:00.000+00:00", number: "1", summary: "Initial Release", }, { date: "2016-01-19T23:00:00.000+00:00", number: "2", summary: "Version nicht vorhanden", }, { date: "2016-01-19T23:00:00.000+00:00", number: "3", summary: "Version nicht vorhanden", }, { date: "2016-01-19T23:00:00.000+00:00", number: "4", summary: "Version nicht vorhanden", }, { date: "2016-01-25T23:00:00.000+00:00", number: "5", summary: "New remediations available", }, { date: "2016-01-25T23:00:00.000+00:00", number: "6", summary: "Version nicht vorhanden", }, { date: "2016-01-26T23:00:00.000+00:00", number: "7", summary: "New remediations available", }, { date: "2016-01-26T23:00:00.000+00:00", number: "8", summary: "Version nicht vorhanden", }, { date: "2016-01-28T23:00:00.000+00:00", number: "9", summary: "New remediations available", }, { date: "2016-01-28T23:00:00.000+00:00", number: "10", summary: "Version nicht vorhanden", }, { date: "2016-02-07T23:00:00.000+00:00", number: "11", summary: "New remediations available", }, { date: "2016-02-07T23:00:00.000+00:00", number: "12", summary: "Version nicht vorhanden", }, { date: "2016-05-02T22:00:00.000+00:00", number: "13", summary: "New remediations available", }, { date: "2016-05-30T22:00:00.000+00:00", number: "14", summary: "New remediations available", }, { date: "2017-05-07T22:00:00.000+00:00", number: "15", summary: "New remediations available", }, { date: "2024-06-30T22:00:00.000+00:00", number: "16", summary: "Neue Updates von Amazon aufgenommen", }, ], status: "final", version: "16", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Amazon Linux 2", product: { name: "Amazon Linux 2", product_id: "398363", product_identification_helper: { cpe: "cpe:/o:amazon:linux_2:-", }, }, }, ], category: "vendor", name: "Amazon", }, { branches: [ { category: "product_name", name: "Debian Linux Jessie (8.0)", product: { name: "Debian Linux Jessie (8.0)", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { branches: [ { category: "product_version_range", name: "<=5.5.46", product: { name: "Oracle MySQL <=5.5.46", product_id: "T006827", }, }, { category: "product_version_range", name: "<=5.6.27", product: { name: "Oracle MySQL <=5.6.27", product_id: "T006828", }, }, { category: "product_version_range", name: "<=5.7.9", product: { name: "Oracle MySQL <=5.7.9", product_id: "T006829", }, }, ], category: "product_name", name: "MySQL", }, ], category: "vendor", name: "Oracle", }, { branches: [ { category: "product_name", name: "Red Hat Enterprise Linux", product: { name: "Red Hat Enterprise Linux", product_id: "67646", product_identification_helper: { cpe: "cpe:/o:redhat:enterprise_linux:-", }, }, }, ], category: "vendor", name: "Red Hat", }, { branches: [ { category: "product_name", name: "Ubuntu Linux", product: { name: "Ubuntu Linux", product_id: "T000126", product_identification_helper: { cpe: "cpe:/o:canonical:ubuntu_linux:-", }, }, }, ], category: "vendor", name: "Ubuntu", }, ], }, vulnerabilities: [ { cve: "CVE-2015-7744", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2015-7744", }, { cve: "CVE-2016-0502", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0502", }, { cve: "CVE-2016-0503", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0503", }, { cve: "CVE-2016-0504", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0504", }, { cve: "CVE-2016-0505", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0505", }, { cve: "CVE-2016-0546", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0546", }, { cve: "CVE-2016-0594", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0594", }, { cve: "CVE-2016-0595", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0595", }, { cve: "CVE-2016-0596", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0596", }, { cve: "CVE-2016-0597", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0597", }, { cve: "CVE-2016-0598", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0598", }, { cve: "CVE-2016-0599", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0599", }, { cve: "CVE-2016-0600", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0600", }, { cve: "CVE-2016-0601", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0601", }, { cve: "CVE-2016-0605", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0605", }, { cve: "CVE-2016-0606", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0606", }, { cve: "CVE-2016-0607", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0607", }, { cve: "CVE-2016-0608", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0608", }, { cve: "CVE-2016-0609", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0609", }, { cve: "CVE-2016-0610", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0610", }, { cve: "CVE-2016-0611", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0611", }, { cve: "CVE-2016-0616", notes: [ { category: "description", text: "In verschiedenen Komponenten von Oracle MySQL existieren insgesamt 22 nicht näher beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrität und Verfügbarkeit gefährden. Für die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle veröffentlicht keine weiteren Details zu diesen Schwachstellen (außer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadenshöhe ausschließlich auf Basis der CVSS Impact Matrix. Der Maximalwert für diese Produkte ist \"Complete\" für \"Confidentiality\", \"Integrity\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadenshöhe.", }, ], product_status: { known_affected: [ "2951", "67646", "T000126", "398363", ], last_affected: [ "T006827", "T006829", "T006828", ], }, release_date: "2016-01-19T23:00:00.000+00:00", title: "CVE-2016-0616", }, ], }
CVE-2016-0599 (GCVE-0-2016-0599)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.910Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0599", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0599", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.910Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0608 (GCVE-0-2016-0608)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.766Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81226", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81226", }, { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "81226", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81226", }, { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0608", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "81226", refsource: "BID", url: "http://www.securityfocus.com/bid/81226", }, { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0608", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.766Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0502 (GCVE-0-2016-0502)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.591Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0502", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0502", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.591Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0601 (GCVE-0-2016-0601)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Partition.
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.906Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Partition.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0601", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Partition.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0601", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.906Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0597 (GCVE-0-2016-0597)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.838Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "81151", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81151", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "81151", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81151", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0597", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "81151", refsource: "BID", url: "http://www.securityfocus.com/bid/81151", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0597", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.838Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0600 (GCVE-0-2016-0600)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.760Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81188", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81188", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81188", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81188", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0600", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81188", refsource: "BID", url: "http://www.securityfocus.com/bid/81188", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0600", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.760Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0607 (GCVE-0-2016-0607)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/81238 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2881-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.784Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81238", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81238", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "81238", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81238", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0607", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "81238", refsource: "BID", url: "http://www.securityfocus.com/bid/81238", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0607", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.784Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0596 (GCVE-0-2016-0596)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.762Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81130", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81130", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81130", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81130", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0596", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81130", refsource: "BID", url: "http://www.securityfocus.com/bid/81130", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0596", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.762Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0609 (GCVE-0-2016-0609)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.681Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "81258", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81258", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "81258", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81258", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0609", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "81258", refsource: "BID", url: "http://www.securityfocus.com/bid/81258", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0609", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.681Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0504 (GCVE-0-2016-0504)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/81077 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2881-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.668Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81077", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81077", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "81077", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81077", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0504", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "81077", refsource: "BID", url: "http://www.securityfocus.com/bid/81077", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0504", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.668Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0616 (GCVE-0-2016-0616)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.850Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "81176", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81176", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "81176", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81176", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0616", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "81176", refsource: "BID", url: "http://www.securityfocus.com/bid/81176", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0616", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.850Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0606 (GCVE-0-2016-0606)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.726Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0606", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0606", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.726Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0595 (GCVE-0-2016-0595)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/81121 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2881-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.741Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "81121", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81121", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "81121", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81121", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0595", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "81121", refsource: "BID", url: "http://www.securityfocus.com/bid/81121", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0595", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.741Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0605 (GCVE-0-2016-0605)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/81253 | vdb-entry, x_refsource_BID | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.695Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81253", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81253", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81253", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81253", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0605", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81253", refsource: "BID", url: "http://www.securityfocus.com/bid/81253", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0605", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.695Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0594 (GCVE-0-2016-0594)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.772Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0594", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0594", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.772Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2015-7744 (GCVE-0-2015-7744)
Vulnerability from cvelistv5
Published
2016-01-22 15:00
Modified
2024-08-06 07:58
Severity ?
EPSS score ?
Summary
wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html | x_refsource_CONFIRM | |
https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf | x_refsource_MISC | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | x_refsource_CONFIRM | |
https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html | x_refsource_CONFIRM | |
https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/ | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T07:58:59.924Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2015-09-17T00:00:00", descriptions: [ { lang: "en", value: "wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html", }, { tags: [ "x_refsource_MISC", ], url: "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html", }, { tags: [ "x_refsource_MISC", ], url: "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2015-7744", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html", refsource: "CONFIRM", url: "http://wolfssl.com/wolfSSL/Docs-wolfssl-changelog.html", }, { name: "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf", refsource: "MISC", url: "https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html", refsource: "CONFIRM", url: "https://wolfssl.com/wolfSSL/Blog/Entries/2015/9/17_Two_Vulnerabilities_Recently_Found%2C_An_Attack_on_RSA_using_CRT_and_DoS_Vulnerability_With_DTLS.html", }, { name: "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/", refsource: "MISC", url: "https://securityblog.redhat.com/2015/09/02/factoring-rsa-keys-with-tls-perfect-forward-secrecy/", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2015-7744", datePublished: "2016-01-22T15:00:00", dateReserved: "2015-10-07T00:00:00", dateUpdated: "2024-08-06T07:58:59.924Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0611 (GCVE-0-2016-0611)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2881-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT | |
http://www.securityfocus.com/bid/81164 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.801Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81164", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81164", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81164", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81164", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0611", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "81164", refsource: "BID", url: "http://www.securityfocus.com/bid/81164", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0611", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.801Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0598 (GCVE-0-2016-0598)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.837Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "81182", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81182", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "81182", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81182", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0598", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "81182", refsource: "BID", url: "http://www.securityfocus.com/bid/81182", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0598", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.837Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0546 (GCVE-0-2016-0546)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.686Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "81066", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81066", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1301493", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "81066", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81066", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://bugzilla.redhat.com/show_bug.cgi?id=1301493", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0546", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client. NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f", refsource: "CONFIRM", url: "https://github.com/mysql/mysql-server/commit/0dbd5a8797ed4bd18e8b883988fb62177eb0f73f", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "81066", refsource: "BID", url: "http://www.securityfocus.com/bid/81066", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "https://bugzilla.redhat.com/show_bug.cgi?id=1301493", refsource: "CONFIRM", url: "https://bugzilla.redhat.com/show_bug.cgi?id=1301493", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html", refsource: "CONFIRM", url: "https://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-47.html", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, { name: "https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html", refsource: "CONFIRM", url: "https://dev.mysql.com/doc/relnotes/mysql/5.6/en/news-5-6-28.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0546", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.686Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0505 (GCVE-0-2016-0505)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.348Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "81088", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81088", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "SUSE-SU-2016:1620", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "81088", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81088", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2016/dsa-3453", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0505", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "SUSE-SU-2016:1620", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00034.html", }, { name: "RHSA-2016:1481", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1481.html", }, { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "DSA-3459", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3459", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "RHSA-2016:0534", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0534.html", }, { name: "81088", refsource: "BID", url: "http://www.securityfocus.com/bid/81088", }, { name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html", }, { name: "SUSE-SU-2016:1619", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00033.html", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "RHSA-2016:1480", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-1480.html", }, { name: "openSUSE-SU-2016:1664", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00051.html", }, { name: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html", }, { name: "https://mariadb.com/kb/en/mdb-10023-rn/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mdb-10023-rn/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "DSA-3453", refsource: "DEBIAN", url: "http://www.debian.org/security/2016/dsa-3453", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-5547-release-notes/", }, { name: "openSUSE-SU-2016:1686", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00053.html", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10110-release-notes/", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0505", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.348Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0610 (GCVE-0-2016-0610)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
https://access.redhat.com/errata/RHSA-2016:1132 | vendor-advisory, x_refsource_REDHAT | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/ | x_refsource_CONFIRM | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/81198 | vdb-entry, x_refsource_BID | |
https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/ | x_refsource_CONFIRM | |
http://www.ubuntu.com/usn/USN-2881-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.743Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81198", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81198", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2018-01-04T19:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81198", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81198", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0610", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "RHSA-2016:1132", refsource: "REDHAT", url: "https://access.redhat.com/errata/RHSA-2016:1132", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-10022-release-notes/", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81198", refsource: "BID", url: "http://www.securityfocus.com/bid/81198", }, { name: "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/", refsource: "CONFIRM", url: "https://mariadb.com/kb/en/mariadb/mariadb-1019-release-notes/", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0610", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.743Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
CVE-2016-0503 (GCVE-0-2016-0503)
Vulnerability from cvelistv5
Published
2016-01-21 02:00
Modified
2024-08-05 22:22
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html | vendor-advisory, x_refsource_SUSE | |
http://www.securitytracker.com/id/1034708 | vdb-entry, x_refsource_SECTRACK | |
http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/81126 | vdb-entry, x_refsource_BID | |
http://www.ubuntu.com/usn/USN-2881-1 | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html | vendor-advisory, x_refsource_SUSE | |
http://rhn.redhat.com/errata/RHSA-2016-0705.html | vendor-advisory, x_refsource_REDHAT |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T22:22:55.226Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81126", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/81126", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", "x_transferred", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-01-19T00:00:00", descriptions: [ { lang: "en", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-12-05T14:57:01", orgId: "43595867-4340-4103-b7a2-9a5208d29a85", shortName: "oracle", }, references: [ { name: "openSUSE-SU-2016:0367", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1034708", }, { tags: [ "x_refsource_CONFIRM", ], url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81126", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/81126", }, { name: "USN-2881-1", tags: [ "vendor-advisory", "x_refsource_UBUNTU", ], url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", tags: [ "vendor-advisory", "x_refsource_SUSE", ], url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", tags: [ "vendor-advisory", "x_refsource_REDHAT", ], url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "secalert_us@oracle.com", ID: "CVE-2016-0503", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "openSUSE-SU-2016:0367", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00015.html", }, { name: "1034708", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1034708", }, { name: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", refsource: "CONFIRM", url: "http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html", }, { name: "81126", refsource: "BID", url: "http://www.securityfocus.com/bid/81126", }, { name: "USN-2881-1", refsource: "UBUNTU", url: "http://www.ubuntu.com/usn/USN-2881-1", }, { name: "openSUSE-SU-2016:0377", refsource: "SUSE", url: "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00016.html", }, { name: "RHSA-2016:0705", refsource: "REDHAT", url: "http://rhn.redhat.com/errata/RHSA-2016-0705.html", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "43595867-4340-4103-b7a2-9a5208d29a85", assignerShortName: "oracle", cveId: "CVE-2016-0503", datePublished: "2016-01-21T02:00:00", dateReserved: "2015-12-09T00:00:00", dateUpdated: "2024-08-05T22:22:55.226Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.