Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - Mailing List, Third Party Advisory | |
References | () http://seclists.org/fulldisclosure/2014/Dec/23 - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/60425 - Not Applicable | |
References | () http://www.debian.org/security/2014/dsa-2985 - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/534161/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/68564 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1030578 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.vmware.com/security/advisories/VMSA-2014-0012.html - Third Party Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/94620 - Third Party Advisory, VDB Entry |
18 Jul 2022, 18:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:mysql:5.5.36:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.35:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.25:a:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.34:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.33:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* |
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:* cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:* cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:* cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:*:*:*:*:*:*:* |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/94620 - Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html - Mailing List, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/60425 - Not Applicable | |
References | (SECTRACK) http://www.securitytracker.com/id/1030578 - Broken Link, Third Party Advisory, VDB Entry | |
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/534161/100/0/threaded - Third Party Advisory, VDB Entry | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2014/Dec/23 - Mailing List, Third Party Advisory |
Information
Published : 2014-07-17 11:17
Updated : 2024-11-21 02:09
NVD link : CVE-2014-4258
Mitre link : CVE-2014-4258
CVE.ORG link : CVE-2014-4258
JSON object : View
Products Affected
vmware
- vcenter_server_appliance
mariadb
- mariadb
debian
- debian_linux
oracle
- solaris
- mysql
suse
- linux_enterprise_server
- linux_enterprise_software_development_kit
- linux_enterprise_workstation_extension
- linux_enterprise_desktop
opensuse_project
- suse_linux_enterprise_desktop
- suse_linux_enterprise_software_development_kit
- suse_linux_enterprise_server
CWE