Unspecified vulnerability in the Server component in Oracle MySQL 5.1.65 and earlier and 5.5.27 and earlier allows remote authenticated users to affect availability, related to GIS Extension.
References
Link | Resource |
---|---|
http://secunia.com/advisories/53372 | Not Applicable |
http://security.gentoo.org/glsa/glsa-201308-06.xml | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Broken Link |
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html | Vendor Advisory |
http://www.ubuntu.com/usn/USN-1703-1 | Third Party Advisory |
http://secunia.com/advisories/53372 | Not Applicable |
http://security.gentoo.org/glsa/glsa-201308-06.xml | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 | Broken Link |
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html | Vendor Advisory |
http://www.ubuntu.com/usn/USN-1703-1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/53372 - Not Applicable | |
References | () http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link | |
References | () http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html - Vendor Advisory | |
References | () http://www.ubuntu.com/usn/USN-1703-1 - Third Party Advisory |
01 Jul 2022, 14:07
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.63:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.64:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.62:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
References | (GENTOO) http://security.gentoo.org/glsa/glsa-201308-06.xml - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - Broken Link | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1703-1 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/53372 - Not Applicable |
Information
Published : 2013-01-17 01:55
Updated : 2024-11-21 01:43
NVD link : CVE-2012-5060
Mitre link : CVE-2012-5060
CVE.ORG link : CVE-2012-5060
JSON object : View
Products Affected
mariadb
- mariadb
oracle
- mysql
canonical
- ubuntu_linux
CWE