Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177539.html - Mailing List, Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1628.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-0534.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2016-1481.html - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3377 - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3385 - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html - Patch, Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/77140 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1033894 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-2781-1 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2016:1132 - Third Party Advisory |
05 Aug 2022, 14:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:* cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:* cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* |
References | (SECTRACK) http://www.securitytracker.com/id/1033894 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2015-10-21 23:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4879
Mitre link : CVE-2015-4879
CVE.ORG link : CVE-2015-4879
JSON object : View
Products Affected
fedoraproject
- fedora
redhat
- enterprise_linux_desktop
- enterprise_linux_server
- enterprise_linux_server_aus
- enterprise_linux_workstation
- enterprise_linux_server_tus
- enterprise_linux_eus
oracle
- solaris
- mysql
- linux
canonical
- ubuntu_linux
mariadb
- mariadb
debian
- debian_linux
CWE