Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
Configuration 5 (hide)
| 
 | 
Configuration 6 (hide)
| 
 | 
Configuration 7 (hide)
| 
 | 
History
                    21 Nov 2024, 02:31
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html - Mailing List, Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2015-1628.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-0534.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-1481.html - Third Party Advisory | |
| References | () http://www.debian.org/security/2015/dsa-3377 - Third Party Advisory | |
| References | () http://www.debian.org/security/2015/dsa-3385 - Third Party Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Vendor Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - Patch, Vendor Advisory | |
| References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/77140 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1033894 - Broken Link, Third Party Advisory, VDB Entry | |
| References | () http://www.ubuntu.com/usn/USN-2781-1 - Third Party Advisory | |
| References | () https://access.redhat.com/errata/RHSA-2016:1132 - Third Party Advisory | 
05 Aug 2022, 14:25
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (SECTRACK) http://www.securitytracker.com/id/1033894 - Broken Link, Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* | cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* | 
Information
                Published : 2015-10-21 23:59
Updated : 2025-04-12 10:46
NVD link : CVE-2015-4879
Mitre link : CVE-2015-4879
CVE.ORG link : CVE-2015-4879
JSON object : View
Products Affected
                mariadb
- mariadb
oracle
- mysql
- solaris
- linux
redhat
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_workstation
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_server_aus
canonical
- ubuntu_linux
debian
- debian_linux
fedoraproject
- fedora
CWE
                