Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0116 (GCVE-0-2012-0116)
Vulnerability from cvelistv5 – Published: 2012-01-18 22:00 – Updated: 2024-08-06 18:16
VLAI?
EPSS
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:16:18.554Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "USN-1397-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "53372",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "48250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48250"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"name": "DSA-2429",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2429"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-01-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-20T17:57:01.000Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "USN-1397-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "53372",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "48250",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48250"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"name": "DSA-2429",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2429"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-1397-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "48250",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48250"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"name": "DSA-2429",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2429"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2012-0116",
"datePublished": "2012-01-18T22:00:00.000Z",
"dateReserved": "2011-12-12T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:16:18.554Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-2373-276G-Q6C3
Vulnerability from github – Published: 2022-05-04 00:28 – Updated: 2022-05-04 00:28
VLAI?
Details
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
{
"affected": [],
"aliases": [
"CVE-2012-0116"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2012-01-18T22:55:00Z",
"severity": "MODERATE"
},
"details": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.",
"id": "GHSA-2373-276g-q6c3",
"modified": "2022-05-04T00:28:06Z",
"published": "2022-05-04T00:28:06Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0116"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/48250"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/53372"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2429"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2012-AVI-024
Vulnerability from certfr_avis - Published: 2012-01-18 - Updated: 2012-01-18
Plusieurs vulnérabilités présentes dans de nombreux produits Oracle ont été corrigées.
Description
Plusieurs vulnérabilités dans les produits Oracle peuvent être exploitées, à distance ou depuis le réseau local, afin de porter atteinte à la confidentialité ou à l'intégrité des données présentes sur le système, de réaliser un déni de service ou d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | PeopleSoft | Oracle PeopleSoft Enterprise CRM version 8.9 ; | ||
| Oracle | N/A | Oracle Sun Product Suite ; | ||
| Oracle | N/A | Oracle Transportation Management versions 5.5, 6.0, 6.1, 6.2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 9.2.4, 10.0.2, 11gR1 (10.3.3, 10.3.4, 10.3.5) ; | ||
| Oracle | N/A | Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ; | ||
| Oracle | MySQL | Oracle MySQL Server, versions 5.0, 5.1, 5.5. | ||
| Oracle | PeopleSoft | Oracle PeopleSoft Enterprise HCM versions 8.9, 9.0, 9.1 ; | ||
| Oracle | N/A | Oracle Database 10g Release 1 version 10.1.0.5 ; | ||
| Oracle | N/A | Oracle Database 11g Release 2 versions 11.2.0.2, 11.2.0.3 ; | ||
| Oracle | N/A | Oracle VM VirtualBox version 4.1 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 3 version 10.1.3.5.0 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i version 11.5.10.2 ; | ||
| Oracle | N/A | Oracle JDEdwards version 8.98 ; | ||
| Oracle | N/A | Oracle Fusion Middleware 11g Release 1 versions 11.1.1.3.0, 11.1.1.4.0, 11.1.1.5.0 ; | ||
| Oracle | N/A | Oracle Outside In Technology versions 8.3.5, 8.3.7 ; | ||
| Oracle | PeopleSoft | Oracle PeopleSoft Enterprise PeopleTools version 8.52 ; | ||
| Oracle | N/A | Oracle Database 11g Release 1 version 11.1.0.7 ; | ||
| Oracle | N/A | Oracle Virtual Desktop Infrastructure version 3.2 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12 versions 12.1.2, 12.1.3 ; |
References
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle PeopleSoft Enterprise CRM version 8.9 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Sun Product Suite ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Transportation Management versions 5.5, 6.0, 6.1, 6.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 9.2.4, 10.0.2, 11gR1 (10.3.3, 10.3.4, 10.3.5) ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2 versions 10.2.0.3, 10.2.0.4, 10.2.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL Server, versions 5.0, 5.1, 5.5.",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle PeopleSoft Enterprise HCM versions 8.9, 9.0, 9.1 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 1 version 10.1.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 2 versions 11.2.0.2, 11.2.0.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle VM VirtualBox version 4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 3 version 10.1.3.5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i version 11.5.10.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JDEdwards version 8.98 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Fusion Middleware 11g Release 1 versions 11.1.1.3.0, 11.1.1.4.0, 11.1.1.5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Outside In Technology versions 8.3.5, 8.3.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle PeopleSoft Enterprise PeopleTools version 8.52 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 1 version 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Virtual Desktop Infrastructure version 3.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12 versions 12.1.2, 12.1.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans les produits Oracle peuvent \u00eatre\nexploit\u00e9es, \u00e0 distance ou depuis le r\u00e9seau local, afin de porter\natteinte \u00e0 la confidentialit\u00e9 ou \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es pr\u00e9sentes sur\nle syst\u00e8me, de r\u00e9aliser un d\u00e9ni de service ou d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0487"
},
{
"name": "CVE-2012-0088",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0088"
},
{
"name": "CVE-2011-2321",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2321"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3509"
},
{
"name": "CVE-2012-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0109"
},
{
"name": "CVE-2012-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0110"
},
{
"name": "CVE-2012-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0115"
},
{
"name": "CVE-2012-0074",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0074"
},
{
"name": "CVE-2012-0078",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0078"
},
{
"name": "CVE-2012-0485",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0485"
},
{
"name": "CVE-2012-0118",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0118"
},
{
"name": "CVE-2011-2326",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2326"
},
{
"name": "CVE-2012-0491",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0491"
},
{
"name": "CVE-2012-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0099"
},
{
"name": "CVE-2012-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0098"
},
{
"name": "CVE-2012-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0119"
},
{
"name": "CVE-2011-2271",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2271"
},
{
"name": "CVE-2012-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0492"
},
{
"name": "CVE-2012-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0096"
},
{
"name": "CVE-2012-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0494"
},
{
"name": "CVE-2012-0117",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0117"
},
{
"name": "CVE-2012-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0105"
},
{
"name": "CVE-2011-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3568"
},
{
"name": "CVE-2012-0488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0488"
},
{
"name": "CVE-2011-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3570"
},
{
"name": "CVE-2012-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0116"
},
{
"name": "CVE-2012-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0101"
},
{
"name": "CVE-2012-0489",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0489"
},
{
"name": "CVE-2012-0085",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0085"
},
{
"name": "CVE-2012-0094",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0094"
},
{
"name": "CVE-2012-0087",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0087"
},
{
"name": "CVE-2012-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0114"
},
{
"name": "CVE-2012-0081",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0081"
},
{
"name": "CVE-2012-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0072"
},
{
"name": "CVE-2012-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0103"
},
{
"name": "CVE-2011-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3565"
},
{
"name": "CVE-2011-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4517"
},
{
"name": "CVE-2012-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0075"
},
{
"name": "CVE-2011-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3566"
},
{
"name": "CVE-2011-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3569"
},
{
"name": "CVE-2012-0097",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0097"
},
{
"name": "CVE-2012-0084",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0084"
},
{
"name": "CVE-2011-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3574"
},
{
"name": "CVE-2011-3531",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3531"
},
{
"name": "CVE-2011-3514",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3514"
},
{
"name": "CVE-2011-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3564"
},
{
"name": "CVE-2011-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4516"
},
{
"name": "CVE-2012-0079",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0079"
},
{
"name": "CVE-2011-3524",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3524"
},
{
"name": "CVE-2012-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0076"
},
{
"name": "CVE-2012-0080",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0080"
},
{
"name": "CVE-2011-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3573"
},
{
"name": "CVE-2011-2325",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2325"
},
{
"name": "CVE-2011-2324",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2324"
},
{
"name": "CVE-2012-0486",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0486"
},
{
"name": "CVE-2012-0082",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0082"
},
{
"name": "CVE-2012-0091",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0091"
},
{
"name": "CVE-2012-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0104"
},
{
"name": "CVE-2012-0089",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0089"
},
{
"name": "CVE-2012-0484",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0484"
},
{
"name": "CVE-2012-0113",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0113"
},
{
"name": "CVE-2012-0077",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0077"
},
{
"name": "CVE-2011-2317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2317"
},
{
"name": "CVE-2012-0073",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0073"
},
{
"name": "CVE-2011-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3571"
},
{
"name": "CVE-2012-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0102"
},
{
"name": "CVE-2012-0100",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0100"
},
{
"name": "CVE-2012-0493",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0493"
},
{
"name": "CVE-2012-0120",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0120"
},
{
"name": "CVE-2012-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0495"
},
{
"name": "CVE-2012-0490",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0490"
},
{
"name": "CVE-2012-0496",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0496"
},
{
"name": "CVE-2012-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0112"
},
{
"name": "CVE-2011-5035",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5035"
},
{
"name": "CVE-2012-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0111"
},
{
"name": "CVE-2012-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0083"
},
{
"name": "CVE-2011-2262",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2262"
}
],
"initial_release_date": "2012-01-18T00:00:00",
"last_revision_date": "2012-01-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Critical Patch Update du 17 janvier 2012 :",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
}
],
"reference": "CERTA-2012-AVI-024",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-01-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans de nombreux produits Oracle ont\n\u00e9t\u00e9 corrig\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle Critical Patch Update du 17 janvier 2012",
"url": null
}
]
}
GSD-2012-0116
Vulnerability from gsd - Updated: 2023-12-13 01:20Details
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2012-0116",
"description": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.",
"id": "GSD-2012-0116",
"references": [
"https://www.suse.com/security/cve/CVE-2012-0116.html",
"https://www.debian.org/security/2012/dsa-2429",
"https://access.redhat.com/errata/RHSA-2012:0105",
"https://alas.aws.amazon.com/cve/html/CVE-2012-0116.html",
"https://linux.oracle.com/cve/CVE-2012-0116.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2012-0116"
],
"details": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.",
"id": "GSD-2012-0116",
"modified": "2023-12-13T01:20:13.359658Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-1397-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "53372",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/53372"
},
{
"name": "GLSA-201308-06",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "48250",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48250"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"name": "DSA-2429",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2012/dsa-2429"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2012-0116"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"name": "GLSA-201308-06",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"name": "53372",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/53372"
},
{
"name": "USN-1397-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"name": "48250",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/48250"
},
{
"name": "DSA-2429",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2012/dsa-2429"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687",
"refsource": "CONFIRM",
"tags": [],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2019-12-17T20:23Z",
"publishedDate": "2012-01-18T22:55Z"
}
}
}
FKIE_CVE-2012-0116
Vulnerability from fkie_nvd - Published: 2012-01-18 22:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "35BED939-3366-4CBF-B6BF-29C0C42E97F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "7D0F7A49-62A2-4201-B6F3-8DB9902A4480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2C56D394-4CE1-4237-A681-1474B5436CC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "B2BFBC7B-5C23-4CDB-AE4F-721378C36B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:*",
"matchCriteriaId": "F68CA8CA-2755-450A-80E2-286A571987F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:*",
"matchCriteriaId": "6287E2C9-DF38-4E4E-A8E4-6AC6ADDC920D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F58612F4-1CAC-4BFC-A9B2-3D4025F428FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73F49A1D-BCA3-4772-8AB3-621CCC997B3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F719DD8E-8379-43C3-97F9-DE350E457F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "342BB65B-1358-441C-B59A-1756BCC6414A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8589B1E7-0D6D-44B4-A36E-8225C5D15828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88FEEE64-899F-4F55-B829-641706E29E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D8597F56-BB14-480C-91CD-CAB96A9DDD8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4C5C88-95A7-4DDA-BC2F-CAFA47B0D67A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB2323C-EFE2-407A-9AE9-8717FA9F8625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6341F695-6034-4CC1-9485-ACD3A0E1A079",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D1DF5F19-ECD9-457F-89C6-6F0271CF4766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "446DB5E9-EF4C-4A53-911E-91A802AECA5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5829BE6A-BC58-482B-9DA1-04FDD413A7A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C85D20DF-702B-4F0B-922D-782474A4B663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "73A09785-3CA4-4797-A836-A958DCDC322F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C4DE3D79-0966-4E14-9288-7C269A2CEEC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "564F6A24-BEB3-4420-A633-8AD54C292436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "047FBCCD-DE7C-41FA-80A3-AD695C643C7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "687CC501-4CB2-4295-86F6-A5E45DEC2D0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "822A718D-AD9D-4AB9-802F-5F5C6309D809",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "CA2D4002-FD96-462D-BA55-4624170CAA4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "0A40FE1C-6EB0-4C75-867E-B1F8408E5A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:*",
"matchCriteriaId": "9D7B68A6-13FA-4EAE-8ED0-5940A72A3D82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "64F37486-E91C-47C4-9F53-4CFDBF8C1EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "53A7D87C-E34C-4595-88D5-CD483B3E8CE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "28103843-D04F-4180-A71D-8DAC4E28C2F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "5FEAE55E-7330-4A5A-A862-8D7E7621EB95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "848D4621-AFB8-4A12-A20E-4FC9F1774DE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "5138E55E-58C1-44B5-A296-A46DF2920DF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "31B9607A-1E58-4471-BEDE-03484A1E9739",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:*",
"matchCriteriaId": "FD25674A-B158-4770-B269-A9A039C79A8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "DDCB266F-E642-4447-8B9C-A58ED4D29227",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:*",
"matchCriteriaId": "8FF8582D-3AB5-4F16-AD52-ED5D0CE10120",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "AB79189C-344C-4D5D-A8D8-C3852F7BCFDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:*",
"matchCriteriaId": "63A48A7A-8DE5-4278-AD0B-4736B45DF337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:*",
"matchCriteriaId": "F828A5AD-5EA5-4B02-8BD4-0B2A109342F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:*",
"matchCriteriaId": "34E9C1C2-3F7E-4447-92B8-8D4F2A623812",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:*",
"matchCriteriaId": "25A6FDB0-A86C-4312-AB75-C2A942315DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "F47B75E9-46C7-45D9-86FA-CBD2B2F853BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:*",
"matchCriteriaId": "042A36D5-A5CE-4DAF-B0CA-2F7F6FEB2D37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "D04AF072-B257-4025-BDD2-9B1519899ECE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:*",
"matchCriteriaId": "E2D79B84-CDC7-4F8B-A59A-E808ED05CC58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "A5F0CA63-8A14-42C0-BD75-C38ACC121EDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:*",
"matchCriteriaId": "5A567DBC-EC87-4F85-9CEF-5210AFED5F1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "D1E7868A-070E-4CF7-9A6E-1C20F0CC34CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC43B01-D72D-4DED-BA0B-A3A72D0F1FD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:*",
"matchCriteriaId": "94461EC8-D582-4C5A-AD1E-25D8BE5982E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:*",
"matchCriteriaId": "771B63F2-3D6B-4A91-B626-A85A86C62D4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:*",
"matchCriteriaId": "119F1C97-94FB-4BDB-ADDD-A47CFB455ED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:*",
"matchCriteriaId": "A6904B58-303E-4B99-A1B0-942864449C79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:*",
"matchCriteriaId": "91FD895F-4390-4E29-91E4-7FAC2465422D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:*",
"matchCriteriaId": "11660E47-0B83-4BE9-8FE5-AE0CD99167CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:*",
"matchCriteriaId": "D0D88EC4-53E3-47C4-B185-1A55CEF5164E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:*",
"matchCriteriaId": "78E1D047-8CCC-4C1F-B151-B937CDA06295",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:*",
"matchCriteriaId": "950EB4D1-6328-41C9-8739-46529C043615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:*",
"matchCriteriaId": "36618CD5-C8DE-4356-B53D-EB12A8F3AEC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:*",
"matchCriteriaId": "0E1B28CE-BFE1-4331-90F9-E6BA672BDAA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:*",
"matchCriteriaId": "B43FDCD2-6FB0-4606-8357-B0F63368C6CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:*",
"matchCriteriaId": "49DC76BF-857D-4CCE-B772-CA73AB14EABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:*",
"matchCriteriaId": "C7CEB039-C129-4C0C-AA90-89A816F96052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:*",
"matchCriteriaId": "8656BD5D-2A3F-48DA-8FEB-FFDD7DA557A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:*",
"matchCriteriaId": "E504B098-BFC4-418C-AD24-F9A02E59DD3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:*",
"matchCriteriaId": "4EBB49CB-C15F-4F5B-B4B8-2C1B91A6A841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:*",
"matchCriteriaId": "ED264D57-BD4F-4020-B120-9DC3175D106F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:*",
"matchCriteriaId": "86C2079F-93E8-4EE3-BE75-836807D93AA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F15ADFE-4C28-4F37-91C8-1963E38056FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD918B47-8319-478B-AB6A-18F502DA691E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "46395846-C122-470B-8CCC-E8136BB30242",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CD8ED2D4-FF24-4F01-A733-26B8B2732304",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F8BA70-7825-4A7C-A9F1-9303AD5AFA45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DA738715-C5B0-45AC-949A-F11BF8F94737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD7AACD-8481-4868-973B-A5593A370CD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DE473AF8-C0F0-42A7-B676-E2364E587689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "28A73404-CEB7-436D-9494-D24CE9ECF2DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CD62B5E1-6BF5-4702-938B-3100E3E6BE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "312DACA6-F414-4EA8-A817-6E1C506AF780",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6095FC85-BF0E-423C-9311-0B6387E91F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "AD0E8107-CAEA-44D7-B82D-2571F7A7E65B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BB58C978-1FBE-4BF9-A473-C99FBF943484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5079BA1C-B1A7-4298-BC8A-EBD63AA45186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "94F7A061-66FE-4EAD-918B-6C4500A21BE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DED856E3-69A6-4681-B1EF-871810E8F7C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C147F1EE-29ED-4211-9F7E-8D0172BD0045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "0812F864-91E0-4B3E-9CB3-33B7514B9330",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "77E105E9-FE65-4B75-9818-D3897294E941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC68032-1200-4506-A678-E7DF474E9C28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "19518B17-0C4B-4589-BB41-87DAF0AB4BC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.x and 5.5.x allows remote authenticated users to affect confidentiality and integrity via unknown vectors."
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en el componente MySQL Server de Oracle MySQL v5.1.x y v5.5.x permite a usuarios remotos autenticados afectar a la confidencialidad y la integridad de los datos a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2012-0116",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-01-18T22:55:06.727",
"references": [
{
"source": "secalert_us@oracle.com",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"source": "secalert_us@oracle.com",
"url": "http://secunia.com/advisories/48250"
},
{
"source": "secalert_us@oracle.com",
"url": "http://secunia.com/advisories/53372"
},
{
"source": "secalert_us@oracle.com",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.debian.org/security/2012/dsa-2429"
},
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"source": "secalert_us@oracle.com",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48250"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/53372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201308-06.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2429"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-1397-1"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…