CVE-2014-0420CVE-2014-0420

Affected configuration(s):

cpe:/a:mysql:mysql:5.5.0
cpe:/a:mysql:mysql:5.5.1
cpe:/a:mysql:mysql:5.5.2
cpe:/a:mysql:mysql:5.5.3
cpe:/a:mysql:mysql:5.5.4
cpe:/a:mysql:mysql:5.5.5
cpe:/a:mysql:mysql:5.5.6
cpe:/a:mysql:mysql:5.5.7
cpe:/a:mysql:mysql:5.5.8
cpe:/a:mysql:mysql:5.5.9
cpe:/a:oracle:mysql:5.5.10
cpe:/a:oracle:mysql:5.5.11
cpe:/a:oracle:mysql:5.5.12
cpe:/a:oracle:mysql:5.5.13
cpe:/a:oracle:mysql:5.5.14
cpe:/a:oracle:mysql:5.5.15
cpe:/a:oracle:mysql:5.5.16
cpe:/a:oracle:mysql:5.5.17
cpe:/a:oracle:mysql:5.5.18
cpe:/a:oracle:mysql:5.5.19
cpe:/a:oracle:mysql:5.5.20
cpe:/a:oracle:mysql:5.5.21
cpe:/a:oracle:mysql:5.5.22
cpe:/a:oracle:mysql:5.5.23
cpe:/a:oracle:mysql:5.5.24
cpe:/a:oracle:mysql:5.5.25
cpe:/a:oracle:mysql:5.5.25:a
cpe:/a:oracle:mysql:5.5.26
cpe:/a:oracle:mysql:5.5.27
cpe:/a:oracle:mysql:5.5.28
cpe:/a:oracle:mysql:5.5.29
cpe:/a:oracle:mysql:5.5.30
cpe:/a:oracle:mysql:5.5.31
cpe:/a:oracle:mysql:5.5.32
cpe:/a:oracle:mysql:5.5.33
cpe:/a:oracle:mysql:5.5.34
cpe:/a:oracle:mysql:5.6.0
cpe:/a:oracle:mysql:5.6.1
cpe:/a:oracle:mysql:5.6.2
cpe:/a:oracle:mysql:5.6.3
cpe:/a:oracle:mysql:5.6.4
cpe:/a:oracle:mysql:5.6.5
cpe:/a:oracle:mysql:5.6.6
cpe:/a:oracle:mysql:5.6.7
cpe:/a:oracle:mysql:5.6.8
cpe:/a:oracle:mysql:5.6.9
cpe:/a:oracle:mysql:5.6.10
cpe:/a:oracle:mysql:5.6.11
cpe:/a:oracle:mysql:5.6.12
cpe:/a:oracle:mysql:5.6.13
cpe:/a:oracle:mysql:5.6.14
cpe:/o:canonical:ubuntu_linux:10.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:12.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:12.10
cpe:/o:canonical:ubuntu_linux:13.10
cpe:/o:oracle:solaris:11.3
cpe:/o:redhat:enterprise_linux_desktop:5.0
cpe:/o:redhat:enterprise_linux_server:5.0
cpe:/o:redhat:enterprise_linux_workstation:5.0

Date published: 2014-01-15T11:08:10.203-05:00

Date last modified: 2017-08-28T21:34:10.403-04:00

CVSS Score: 2.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://osvdb.org/102077

Summary: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.34 and earlier, and 5.6.14 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Replication.

CVE-2014-0128CVE-2014-0128

Affected configuration(s):

cpe:/a:squid-cache:squid:3.1
cpe:/a:squid-cache:squid:3.1.0.1
cpe:/a:squid-cache:squid:3.1.0.2
cpe:/a:squid-cache:squid:3.1.0.3
cpe:/a:squid-cache:squid:3.1.0.4
cpe:/a:squid-cache:squid:3.1.0.5
cpe:/a:squid-cache:squid:3.1.0.6
cpe:/a:squid-cache:squid:3.1.0.7
cpe:/a:squid-cache:squid:3.1.0.8
cpe:/a:squid-cache:squid:3.1.0.9
cpe:/a:squid-cache:squid:3.1.0.10
cpe:/a:squid-cache:squid:3.1.0.11
cpe:/a:squid-cache:squid:3.1.0.12
cpe:/a:squid-cache:squid:3.1.0.13
cpe:/a:squid-cache:squid:3.1.0.14
cpe:/a:squid-cache:squid:3.1.0.15
cpe:/a:squid-cache:squid:3.1.0.16
cpe:/a:squid-cache:squid:3.1.0.17
cpe:/a:squid-cache:squid:3.1.0.18
cpe:/a:squid-cache:squid:3.1.1
cpe:/a:squid-cache:squid:3.1.2
cpe:/a:squid-cache:squid:3.1.3
cpe:/a:squid-cache:squid:3.1.4
cpe:/a:squid-cache:squid:3.1.5
cpe:/a:squid-cache:squid:3.1.5.1
cpe:/a:squid-cache:squid:3.1.6
cpe:/a:squid-cache:squid:3.1.7
cpe:/a:squid-cache:squid:3.1.8
cpe:/a:squid-cache:squid:3.1.9
cpe:/a:squid-cache:squid:3.1.10
cpe:/a:squid-cache:squid:3.1.11
cpe:/a:squid-cache:squid:3.1.12
cpe:/a:squid-cache:squid:3.1.13
cpe:/a:squid-cache:squid:3.1.14
cpe:/a:squid-cache:squid:3.1.15
cpe:/a:squid-cache:squid:3.2.0.1
cpe:/a:squid-cache:squid:3.2.0.2
cpe:/a:squid-cache:squid:3.2.0.3
cpe:/a:squid-cache:squid:3.2.0.4
cpe:/a:squid-cache:squid:3.2.0.5
cpe:/a:squid-cache:squid:3.2.0.6
cpe:/a:squid-cache:squid:3.2.0.7
cpe:/a:squid-cache:squid:3.2.0.8
cpe:/a:squid-cache:squid:3.2.0.9
cpe:/a:squid-cache:squid:3.2.0.10
cpe:/a:squid-cache:squid:3.2.0.11
cpe:/a:squid-cache:squid:3.2.0.12
cpe:/a:squid-cache:squid:3.2.0.13
cpe:/a:squid-cache:squid:3.2.0.14
cpe:/a:squid-cache:squid:3.2.0.15
cpe:/a:squid-cache:squid:3.2.0.16
cpe:/a:squid-cache:squid:3.2.0.17
cpe:/a:squid-cache:squid:3.2.0.18
cpe:/a:squid-cache:squid:3.2.0.19
cpe:/a:squid-cache:squid:3.2.1
cpe:/a:squid-cache:squid:3.2.2
cpe:/a:squid-cache:squid:3.2.3
cpe:/a:squid-cache:squid:3.2.4
cpe:/a:squid-cache:squid:3.2.5
cpe:/a:squid-cache:squid:3.2.6
cpe:/a:squid-cache:squid:3.2.7
cpe:/a:squid-cache:squid:3.2.8
cpe:/a:squid-cache:squid:3.2.9
cpe:/a:squid-cache:squid:3.2.10
cpe:/a:squid-cache:squid:3.2.11
cpe:/a:squid-cache:squid:3.2.12
cpe:/a:squid-cache:squid:3.3.0
cpe:/a:squid-cache:squid:3.3.0.2
cpe:/a:squid-cache:squid:3.3.0.3
cpe:/a:squid-cache:squid:3.3.1
cpe:/a:squid-cache:squid:3.3.2
cpe:/a:squid-cache:squid:3.3.3
cpe:/a:squid-cache:squid:3.3.4
cpe:/a:squid-cache:squid:3.3.5
cpe:/a:squid-cache:squid:3.3.6
cpe:/a:squid-cache:squid:3.3.7
cpe:/a:squid-cache:squid:3.3.8
cpe:/a:squid-cache:squid:3.3.9
cpe:/a:squid-cache:squid:3.3.10
cpe:/a:squid-cache:squid:3.3.11
cpe:/a:squid-cache:squid:3.4.0.1
cpe:/a:squid-cache:squid:3.4.0.2
cpe:/a:squid-cache:squid:3.4.0.3
cpe:/a:squid-cache:squid:3.4.1
cpe:/a:squid-cache:squid:3.4.2
cpe:/a:squid-cache:squid:3.4.3
cpe:/o:novell:opensuse:11.4

Date published: 2014-04-14T11:09:05.710-04:00

Date last modified: 2017-12-15T21:29:03.120-05:00

CVSS Score: 5.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html

Summary: Squid 3.1 before 3.3.12 and 3.4 before 3.4.4, when SSL-Bump is enabled, allows remote attackers to cause a denial of service (assertion failure) via a crafted range request, related to state management.

CVE-2014-2494CVE-2014-2494

Affected configuration(s):

cpe:/a:oracle:mysql:5.5.10
cpe:/a:oracle:mysql:5.5.11
cpe:/a:oracle:mysql:5.5.12
cpe:/a:oracle:mysql:5.5.13
cpe:/a:oracle:mysql:5.5.14
cpe:/a:oracle:mysql:5.5.15
cpe:/a:oracle:mysql:5.5.16
cpe:/a:oracle:mysql:5.5.17
cpe:/a:oracle:mysql:5.5.18
cpe:/a:oracle:mysql:5.5.19
cpe:/a:oracle:mysql:5.5.20
cpe:/a:oracle:mysql:5.5.21
cpe:/a:oracle:mysql:5.5.22
cpe:/a:oracle:mysql:5.5.23
cpe:/a:oracle:mysql:5.5.24
cpe:/a:oracle:mysql:5.5.25
cpe:/a:oracle:mysql:5.5.25:a
cpe:/a:oracle:mysql:5.5.26
cpe:/a:oracle:mysql:5.5.27
cpe:/a:oracle:mysql:5.5.28
cpe:/a:oracle:mysql:5.5.29
cpe:/a:oracle:mysql:5.5.30
cpe:/a:oracle:mysql:5.5.31
cpe:/a:oracle:mysql:5.5.32
cpe:/a:oracle:mysql:5.5.33
cpe:/a:oracle:mysql:5.5.34
cpe:/a:oracle:mysql:5.5.35
cpe:/a:oracle:mysql:5.5.36
cpe:/a:oracle:mysql:5.5.37

Date published: 2014-07-17T01:10:15.153-04:00

Date last modified: 2017-01-06T21:59:47.487-05:00

CVSS Score: 4.0

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html

Summary: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier allows remote authenticated users to affect availability via vectors related to ENARC.

CVE-2014-6270CVE-2014-6270

Affected configuration(s):

cpe:/a:squid-cache:squid:2.4.stable1
cpe:/a:squid-cache:squid:2.4.stable2
cpe:/a:squid-cache:squid:2.4.stable3
cpe:/a:squid-cache:squid:2.4.stable4
cpe:/a:squid-cache:squid:2.4.stable5
cpe:/a:squid-cache:squid:2.4.stable6
cpe:/a:squid-cache:squid:2.4.stable7
cpe:/a:squid-cache:squid:2.5.stable1
cpe:/a:squid-cache:squid:2.5.stable2
cpe:/a:squid-cache:squid:2.5.stable3
cpe:/a:squid-cache:squid:2.5.stable4
cpe:/a:squid-cache:squid:2.5.stable5
cpe:/a:squid-cache:squid:2.5.stable6
cpe:/a:squid-cache:squid:2.5.stable7
cpe:/a:squid-cache:squid:2.5.stable8
cpe:/a:squid-cache:squid:2.5.stable9
cpe:/a:squid-cache:squid:2.5.stable10
cpe:/a:squid-cache:squid:2.5.stable11
cpe:/a:squid-cache:squid:2.5.stable12
cpe:/a:squid-cache:squid:2.5.stable13
cpe:/a:squid-cache:squid:2.5.stable14
cpe:/a:squid-cache:squid:2.6.stable1
cpe:/a:squid-cache:squid:2.6.stable2
cpe:/a:squid-cache:squid:2.6.stable3
cpe:/a:squid-cache:squid:2.6.stable4
cpe:/a:squid-cache:squid:2.6.stable5
cpe:/a:squid-cache:squid:2.6.stable6
cpe:/a:squid-cache:squid:2.6.stable7
cpe:/a:squid-cache:squid:2.6.stable8
cpe:/a:squid-cache:squid:2.6.stable9
cpe:/a:squid-cache:squid:2.6.stable10
cpe:/a:squid-cache:squid:2.6.stable11
cpe:/a:squid-cache:squid:2.6.stable12
cpe:/a:squid-cache:squid:2.6.stable13
cpe:/a:squid-cache:squid:2.6.stable14
cpe:/a:squid-cache:squid:2.6.stable15
cpe:/a:squid-cache:squid:2.6.stable16
cpe:/a:squid-cache:squid:2.6.stable17
cpe:/a:squid-cache:squid:2.6.stable18
cpe:/a:squid-cache:squid:2.6.stable19
cpe:/a:squid-cache:squid:2.6.stable20
cpe:/a:squid-cache:squid:2.6.stable21
cpe:/a:squid-cache:squid:2.6.stable22
cpe:/a:squid-cache:squid:2.6.stable23
cpe:/a:squid-cache:squid:2.7.stable1
cpe:/a:squid-cache:squid:2.7.stable2
cpe:/a:squid-cache:squid:2.7.stable3
cpe:/a:squid-cache:squid:2.7.stable4
cpe:/a:squid-cache:squid:2.7.stable5
cpe:/a:squid-cache:squid:2.7.stable6
cpe:/a:squid-cache:squid:2.7.stable7
cpe:/a:squid-cache:squid:2.7.stable8
cpe:/a:squid-cache:squid:2.7.stable9
cpe:/a:squid-cache:squid:3.0
cpe:/a:squid-cache:squid:3.0:-:pre1
cpe:/a:squid-cache:squid:3.0:-:pre2
cpe:/a:squid-cache:squid:3.0:-:pre3
cpe:/a:squid-cache:squid:3.0:-:pre4
cpe:/a:squid-cache:squid:3.0:-:pre5
cpe:/a:squid-cache:squid:3.0:-:pre6
cpe:/a:squid-cache:squid:3.0:-:pre7
cpe:/a:squid-cache:squid:3.0:rc4
cpe:/a:squid-cache:squid:3.0.stable1
cpe:/a:squid-cache:squid:3.0.stable2
cpe:/a:squid-cache:squid:3.0.stable3
cpe:/a:squid-cache:squid:3.0.stable4
cpe:/a:squid-cache:squid:3.0.stable5
cpe:/a:squid-cache:squid:3.0.stable6
cpe:/a:squid-cache:squid:3.0.stable7
cpe:/a:squid-cache:squid:3.0.stable8
cpe:/a:squid-cache:squid:3.0.stable9
cpe:/a:squid-cache:squid:3.0.stable10
cpe:/a:squid-cache:squid:3.0.stable11
cpe:/a:squid-cache:squid:3.0.stable11:rc1
cpe:/a:squid-cache:squid:3.0.stable12
cpe:/a:squid-cache:squid:3.0.stable13
cpe:/a:squid-cache:squid:3.0.stable14
cpe:/a:squid-cache:squid:3.0.stable15
cpe:/a:squid-cache:squid:3.0.stable16
cpe:/a:squid-cache:squid:3.0.stable16:rc1
cpe:/a:squid-cache:squid:3.0.stable17
cpe:/a:squid-cache:squid:3.0.stable18
cpe:/a:squid-cache:squid:3.0.stable19
cpe:/a:squid-cache:squid:3.0.stable20
cpe:/a:squid-cache:squid:3.0.stable21
cpe:/a:squid-cache:squid:3.0.stable22
cpe:/a:squid-cache:squid:3.0.stable23
cpe:/a:squid-cache:squid:3.0.stable24
cpe:/a:squid-cache:squid:3.0.stable25
cpe:/a:squid-cache:squid:3.1
cpe:/a:squid-cache:squid:3.1.0.1
cpe:/a:squid-cache:squid:3.1.0.2
cpe:/a:squid-cache:squid:3.1.0.3
cpe:/a:squid-cache:squid:3.1.0.4
cpe:/a:squid-cache:squid:3.1.0.5
cpe:/a:squid-cache:squid:3.1.0.6
cpe:/a:squid-cache:squid:3.1.0.7
cpe:/a:squid-cache:squid:3.1.0.8
cpe:/a:squid-cache:squid:3.1.0.9
cpe:/a:squid-cache:squid:3.1.0.10
cpe:/a:squid-cache:squid:3.1.0.11
cpe:/a:squid-cache:squid:3.1.0.12
cpe:/a:squid-cache:squid:3.1.0.13
cpe:/a:squid-cache:squid:3.1.0.14
cpe:/a:squid-cache:squid:3.1.0.15
cpe:/a:squid-cache:squid:3.1.0.16
cpe:/a:squid-cache:squid:3.1.0.17
cpe:/a:squid-cache:squid:3.1.0.18
cpe:/a:squid-cache:squid:3.1.1
cpe:/a:squid-cache:squid:3.1.2
cpe:/a:squid-cache:squid:3.1.3
cpe:/a:squid-cache:squid:3.1.4
cpe:/a:squid-cache:squid:3.1.5
cpe:/a:squid-cache:squid:3.1.5.1
cpe:/a:squid-cache:squid:3.1.6
cpe:/a:squid-cache:squid:3.1.7
cpe:/a:squid-cache:squid:3.1.8
cpe:/a:squid-cache:squid:3.1.9
cpe:/a:squid-cache:squid:3.1.10
cpe:/a:squid-cache:squid:3.1.11
cpe:/a:squid-cache:squid:3.1.12
cpe:/a:squid-cache:squid:3.1.13
cpe:/a:squid-cache:squid:3.1.14
cpe:/a:squid-cache:squid:3.1.15
cpe:/a:squid-cache:squid:3.2.0.1
cpe:/a:squid-cache:squid:3.2.0.2
cpe:/a:squid-cache:squid:3.2.0.3
cpe:/a:squid-cache:squid:3.2.0.4
cpe:/a:squid-cache:squid:3.2.0.5
cpe:/a:squid-cache:squid:3.2.0.6
cpe:/a:squid-cache:squid:3.2.0.7
cpe:/a:squid-cache:squid:3.2.0.8
cpe:/a:squid-cache:squid:3.2.0.9
cpe:/a:squid-cache:squid:3.2.0.10
cpe:/a:squid-cache:squid:3.2.0.11
cpe:/a:squid-cache:squid:3.2.0.12
cpe:/a:squid-cache:squid:3.2.0.13
cpe:/a:squid-cache:squid:3.2.0.14
cpe:/a:squid-cache:squid:3.2.0.15
cpe:/a:squid-cache:squid:3.2.0.16
cpe:/a:squid-cache:squid:3.2.0.17
cpe:/a:squid-cache:squid:3.2.0.18
cpe:/a:squid-cache:squid:3.2.0.19
cpe:/a:squid-cache:squid:3.2.1
cpe:/a:squid-cache:squid:3.2.2
cpe:/a:squid-cache:squid:3.2.3
cpe:/a:squid-cache:squid:3.2.4
cpe:/a:squid-cache:squid:3.2.5
cpe:/a:squid-cache:squid:3.2.6
cpe:/a:squid-cache:squid:3.2.7
cpe:/a:squid-cache:squid:3.2.8
cpe:/a:squid-cache:squid:3.2.9
cpe:/a:squid-cache:squid:3.2.10
cpe:/a:squid-cache:squid:3.2.11
cpe:/a:squid-cache:squid:3.2.12
cpe:/a:squid-cache:squid:3.3.0
cpe:/a:squid-cache:squid:3.3.0.2
cpe:/a:squid-cache:squid:3.3.0.3
cpe:/a:squid-cache:squid:3.3.1
cpe:/a:squid-cache:squid:3.3.2
cpe:/a:squid-cache:squid:3.3.3
cpe:/a:squid-cache:squid:3.3.4
cpe:/a:squid-cache:squid:3.3.5
cpe:/a:squid-cache:squid:3.3.6
cpe:/a:squid-cache:squid:3.3.7
cpe:/a:squid-cache:squid:3.3.8
cpe:/a:squid-cache:squid:3.3.9
cpe:/a:squid-cache:squid:3.3.10
cpe:/a:squid-cache:squid:3.3.11
cpe:/a:squid-cache:squid:3.3.12
cpe:/a:squid-cache:squid:3.4.0.1
cpe:/a:squid-cache:squid:3.4.0.2
cpe:/a:squid-cache:squid:3.4.0.3
cpe:/a:squid-cache:squid:3.4.1
cpe:/a:squid-cache:squid:3.4.2
cpe:/a:squid-cache:squid:3.4.3
cpe:/a:squid-cache:squid:3.4.4
cpe:/a:squid-cache:squid:3.4.5
cpe:/a:squid-cache:squid:3.4.6
cpe:/a:squid-cache:squid:3.4.7
cpe:/o:oracle:solaris:11.2

Date published: 2014-09-12T10:55:07.907-04:00

Date last modified: 2017-09-07T21:29:13.510-04:00

CVSS Score: 6.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00010.html

Summary: Off-by-one error in the snmpHandleUdp function in snmp_core.cc in Squid 2.x and 3.x, when an SNMP port is configured, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted UDP SNMP request, which triggers a heap-based buffer overflow.

CVE-2014-4274CVE-2014-4274

Affected configuration(s):

cpe:/a:oracle:mysql:5.5.1
cpe:/a:oracle:mysql:5.5.2
cpe:/a:oracle:mysql:5.5.3
cpe:/a:oracle:mysql:5.5.4
cpe:/a:oracle:mysql:5.5.5
cpe:/a:oracle:mysql:5.5.6
cpe:/a:oracle:mysql:5.5.7
cpe:/a:oracle:mysql:5.5.8
cpe:/a:oracle:mysql:5.5.9
cpe:/a:oracle:mysql:5.5.10
cpe:/a:oracle:mysql:5.5.11
cpe:/a:oracle:mysql:5.5.12
cpe:/a:oracle:mysql:5.5.13
cpe:/a:oracle:mysql:5.5.14
cpe:/a:oracle:mysql:5.5.15
cpe:/a:oracle:mysql:5.5.16
cpe:/a:oracle:mysql:5.5.17
cpe:/a:oracle:mysql:5.5.18
cpe:/a:oracle:mysql:5.5.19
cpe:/a:oracle:mysql:5.5.20
cpe:/a:oracle:mysql:5.5.21
cpe:/a:oracle:mysql:5.5.22
cpe:/a:oracle:mysql:5.5.23
cpe:/a:oracle:mysql:5.5.24
cpe:/a:oracle:mysql:5.5.25
cpe:/a:oracle:mysql:5.5.25:a
cpe:/a:oracle:mysql:5.5.26
cpe:/a:oracle:mysql:5.5.27
cpe:/a:oracle:mysql:5.5.28
cpe:/a:oracle:mysql:5.5.29
cpe:/a:oracle:mysql:5.5.30
cpe:/a:oracle:mysql:5.5.31
cpe:/a:oracle:mysql:5.5.32
cpe:/a:oracle:mysql:5.5.33
cpe:/a:oracle:mysql:5.5.34
cpe:/a:oracle:mysql:5.5.35
cpe:/a:oracle:mysql:5.5.36
cpe:/a:oracle:mysql:5.5.37
cpe:/a:oracle:mysql:5.5.38
cpe:/a:oracle:mysql:5.6.0
cpe:/a:oracle:mysql:5.6.1
cpe:/a:oracle:mysql:5.6.2
cpe:/a:oracle:mysql:5.6.3
cpe:/a:oracle:mysql:5.6.4
cpe:/a:oracle:mysql:5.6.5
cpe:/a:oracle:mysql:5.6.6
cpe:/a:oracle:mysql:5.6.7
cpe:/a:oracle:mysql:5.6.8
cpe:/a:oracle:mysql:5.6.9
cpe:/a:oracle:mysql:5.6.10
cpe:/a:oracle:mysql:5.6.11
cpe:/a:oracle:mysql:5.6.12
cpe:/a:oracle:mysql:5.6.13
cpe:/a:oracle:mysql:5.6.14
cpe:/a:oracle:mysql:5.6.15
cpe:/a:oracle:mysql:5.6.16
cpe:/a:oracle:mysql:5.6.17
cpe:/a:oracle:mysql:5.6.18
cpe:/a:oracle:mysql:5.6.19
cpe:/o:oracle:solaris:11.3

Date published: 2014-10-15T11:55:06.307-04:00

Date last modified: 2017-01-02T21:59:06.017-05:00

CVSS Score: 4.1

Principal attack vector: LOCAL

Complexity:  MEDIUM

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html

Summary: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to SERVER:MyISAM.

CVE-2014-4243CVE-2014-4243

Affected configuration(s):

cpe:/a:mysql:mysql:5.5.0
cpe:/a:mysql:mysql:5.5.1
cpe:/a:mysql:mysql:5.5.2
cpe:/a:mysql:mysql:5.5.3
cpe:/a:mysql:mysql:5.5.4
cpe:/a:mysql:mysql:5.5.5
cpe:/a:mysql:mysql:5.5.6
cpe:/a:mysql:mysql:5.5.7
cpe:/a:mysql:mysql:5.5.8
cpe:/a:mysql:mysql:5.5.9
cpe:/a:oracle:mysql:5.5.10
cpe:/a:oracle:mysql:5.5.11
cpe:/a:oracle:mysql:5.5.12
cpe:/a:oracle:mysql:5.5.13
cpe:/a:oracle:mysql:5.5.14
cpe:/a:oracle:mysql:5.5.15
cpe:/a:oracle:mysql:5.5.16
cpe:/a:oracle:mysql:5.5.17
cpe:/a:oracle:mysql:5.5.18
cpe:/a:oracle:mysql:5.5.19
cpe:/a:oracle:mysql:5.5.20
cpe:/a:oracle:mysql:5.5.21
cpe:/a:oracle:mysql:5.5.22
cpe:/a:oracle:mysql:5.5.23
cpe:/a:oracle:mysql:5.5.24
cpe:/a:oracle:mysql:5.5.25
cpe:/a:oracle:mysql:5.5.25:a
cpe:/a:oracle:mysql:5.5.26
cpe:/a:oracle:mysql:5.5.27
cpe:/a:oracle:mysql:5.5.28
cpe:/a:oracle:mysql:5.5.29
cpe:/a:oracle:mysql:5.5.30
cpe:/a:oracle:mysql:5.5.31
cpe:/a:oracle:mysql:5.5.32
cpe:/a:oracle:mysql:5.5.33
cpe:/a:oracle:mysql:5.5.34
cpe:/a:oracle:mysql:5.5.35
cpe:/a:oracle:mysql:5.6.0
cpe:/a:oracle:mysql:5.6.1
cpe:/a:oracle:mysql:5.6.2
cpe:/a:oracle:mysql:5.6.3
cpe:/a:oracle:mysql:5.6.4
cpe:/a:oracle:mysql:5.6.10
cpe:/a:oracle:mysql:5.6.11
cpe:/a:oracle:mysql:5.6.12
cpe:/a:oracle:mysql:5.6.13
cpe:/a:oracle:mysql:5.6.14
cpe:/a:oracle:mysql:5.6.15
cpe:/o:opensuse_project:suse_linux_enterprise_desktop:11.0:sp3
cpe:/o:opensuse_project:suse_linux_enterprise_server:11.0:sp3
cpe:/o:opensuse_project:suse_linux_enterprise_server:11.0:sp3:~~~vmware~~
cpe:/o:opensuse_project:suse_linux_enterprise_software_development_kit:11.0:sp3
cpe:/o:oracle:solaris:11.3

Date published: 2014-07-17T07:17:10.093-04:00

Date last modified: 2017-08-28T21:34:54.593-04:00

CVSS Score: 2.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html

Summary: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.35 and earlier and 5.6.15 and earlier allows remote authenticated users to affect availability via vectors related to ENFED.

CVE-2014-4258CVE-2014-4258

Affected configuration(s):

cpe:/a:mysql:mysql:5.5.0
cpe:/a:mysql:mysql:5.5.1
cpe:/a:mysql:mysql:5.5.2
cpe:/a:mysql:mysql:5.5.3
cpe:/a:mysql:mysql:5.5.4
cpe:/a:mysql:mysql:5.5.5
cpe:/a:mysql:mysql:5.5.6
cpe:/a:mysql:mysql:5.5.7
cpe:/a:mysql:mysql:5.5.8
cpe:/a:mysql:mysql:5.5.9
cpe:/a:oracle:mysql:5.5.10
cpe:/a:oracle:mysql:5.5.11
cpe:/a:oracle:mysql:5.5.12
cpe:/a:oracle:mysql:5.5.13
cpe:/a:oracle:mysql:5.5.14
cpe:/a:oracle:mysql:5.5.15
cpe:/a:oracle:mysql:5.5.16
cpe:/a:oracle:mysql:5.5.17
cpe:/a:oracle:mysql:5.5.18
cpe:/a:oracle:mysql:5.5.19
cpe:/a:oracle:mysql:5.5.20
cpe:/a:oracle:mysql:5.5.21
cpe:/a:oracle:mysql:5.5.22
cpe:/a:oracle:mysql:5.5.23
cpe:/a:oracle:mysql:5.5.24
cpe:/a:oracle:mysql:5.5.25
cpe:/a:oracle:mysql:5.5.25:a
cpe:/a:oracle:mysql:5.5.26
cpe:/a:oracle:mysql:5.5.27
cpe:/a:oracle:mysql:5.5.28
cpe:/a:oracle:mysql:5.5.29
cpe:/a:oracle:mysql:5.5.30
cpe:/a:oracle:mysql:5.5.31
cpe:/a:oracle:mysql:5.5.32
cpe:/a:oracle:mysql:5.5.33
cpe:/a:oracle:mysql:5.5.34
cpe:/a:oracle:mysql:5.5.35
cpe:/a:oracle:mysql:5.5.36
cpe:/a:oracle:mysql:5.5.37
cpe:/a:oracle:mysql:5.6.0
cpe:/a:oracle:mysql:5.6.1
cpe:/a:oracle:mysql:5.6.2
cpe:/a:oracle:mysql:5.6.3
cpe:/a:oracle:mysql:5.6.4
cpe:/a:oracle:mysql:5.6.5
cpe:/a:oracle:mysql:5.6.6
cpe:/a:oracle:mysql:5.6.7
cpe:/a:oracle:mysql:5.6.8
cpe:/a:oracle:mysql:5.6.9
cpe:/a:oracle:mysql:5.6.10
cpe:/a:oracle:mysql:5.6.11
cpe:/a:oracle:mysql:5.6.12
cpe:/a:oracle:mysql:5.6.13
cpe:/a:oracle:mysql:5.6.14
cpe:/a:oracle:mysql:5.6.15
cpe:/a:oracle:mysql:5.6.16
cpe:/a:oracle:mysql:5.6.17
cpe:/a:vmware:vcenter_server_appliance:5.0
cpe:/a:vmware:vcenter_server_appliance:5.0:update_1
cpe:/a:vmware:vcenter_server_appliance:5.0:update_2
cpe:/a:vmware:vcenter_server_appliance:5.1
cpe:/a:vmware:vcenter_server_appliance:5.1:update_1
cpe:/a:vmware:vcenter_server_appliance:5.1:update_2
cpe:/a:vmware:vcenter_server_appliance:5.5
cpe:/a:vmware:vcenter_server_appliance:5.5:update_1
cpe:/o:debian:debian_linux:7.0
cpe:/o:opensuse_project:suse_linux_enterprise_desktop:11.0:sp3
cpe:/o:opensuse_project:suse_linux_enterprise_server:11.0:sp3
cpe:/o:opensuse_project:suse_linux_enterprise_server:11.0:sp3:~~~vmware~~
cpe:/o:opensuse_project:suse_linux_enterprise_software_development_kit:11.0:sp3
cpe:/o:oracle:solaris:11.3

Date published: 2014-07-17T07:17:10.747-04:00

Date last modified: 2017-08-28T21:34:55.547-04:00

CVSS Score: 6.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2014-08/msg00012.html

Summary: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.37 and earlier and 5.6.17 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SRINFOSC.

CVE-2014-6051CVE-2014-6051

Affected configuration(s):

cpe:/a:libvncserver:libvncserver:0.9.9
cpe:/o:debian:debian_linux:7.0
cpe:/o:fedoraproject:fedora:20
cpe:/o:fedoraproject:fedora:21
cpe:/o:oracle:solaris:11.3
cpe:/o:redhat:enterprise_linux_server_aus:6.5
cpe:/o:redhat:enterprise_linux_server_eus:6.5.z

Date published: 2014-09-30T12:55:07.010-04:00

Date last modified: 2017-06-30T21:29:07.157-04:00

CVSS Score: 7.5

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.fedoraproject.org/pipermail/package-announce/2014-October/139654.html

Summary: Integer overflow in the MallocFrameBuffer function in vncviewer.c in LibVNCServer 0.9.9 and earlier allows remote VNC servers to cause a denial of service (crash) and possibly execute arbitrary code via an advertisement for a large screen size, which triggers a heap-based buffer overflow.

CVE-2014-6463CVE-2014-6463

Affected configuration(s):

cpe:/a:mysql:mysql:5.5.0
cpe:/a:mysql:mysql:5.5.1
cpe:/a:mysql:mysql:5.5.2
cpe:/a:mysql:mysql:5.5.3
cpe:/a:mysql:mysql:5.5.4
cpe:/a:mysql:mysql:5.5.5
cpe:/a:mysql:mysql:5.5.6
cpe:/a:mysql:mysql:5.5.7
cpe:/a:mysql:mysql:5.5.8
cpe:/a:mysql:mysql:5.5.9
cpe:/a:oracle:mysql:5.5.10
cpe:/a:oracle:mysql:5.5.11
cpe:/a:oracle:mysql:5.5.12
cpe:/a:oracle:mysql:5.5.13
cpe:/a:oracle:mysql:5.5.14
cpe:/a:oracle:mysql:5.5.15
cpe:/a:oracle:mysql:5.5.16
cpe:/a:oracle:mysql:5.5.17
cpe:/a:oracle:mysql:5.5.18
cpe:/a:oracle:mysql:5.5.19
cpe:/a:oracle:mysql:5.5.20
cpe:/a:oracle:mysql:5.5.21
cpe:/a:oracle:mysql:5.5.22
cpe:/a:oracle:mysql:5.5.23
cpe:/a:oracle:mysql:5.5.24
cpe:/a:oracle:mysql:5.5.25
cpe:/a:oracle:mysql:5.5.25:a
cpe:/a:oracle:mysql:5.5.26
cpe:/a:oracle:mysql:5.5.27
cpe:/a:oracle:mysql:5.5.28
cpe:/a:oracle:mysql:5.5.29
cpe:/a:oracle:mysql:5.5.30
cpe:/a:oracle:mysql:5.5.31
cpe:/a:oracle:mysql:5.5.32
cpe:/a:oracle:mysql:5.5.33
cpe:/a:oracle:mysql:5.5.34
cpe:/a:oracle:mysql:5.5.35
cpe:/a:oracle:mysql:5.5.36
cpe:/a:oracle:mysql:5.5.37
cpe:/a:oracle:mysql:5.5.38
cpe:/a:oracle:mysql:5.6.0
cpe:/a:oracle:mysql:5.6.1
cpe:/a:oracle:mysql:5.6.2
cpe:/a:oracle:mysql:5.6.3
cpe:/a:oracle:mysql:5.6.4
cpe:/a:oracle:mysql:5.6.5
cpe:/a:oracle:mysql:5.6.6
cpe:/a:oracle:mysql:5.6.7
cpe:/a:oracle:mysql:5.6.8
cpe:/a:oracle:mysql:5.6.9
cpe:/a:oracle:mysql:5.6.10
cpe:/a:oracle:mysql:5.6.11
cpe:/a:oracle:mysql:5.6.12
cpe:/a:oracle:mysql:5.6.13
cpe:/a:oracle:mysql:5.6.14
cpe:/a:oracle:mysql:5.6.15
cpe:/a:oracle:mysql:5.6.16
cpe:/a:oracle:mysql:5.6.17
cpe:/a:oracle:mysql:5.6.18
cpe:/a:oracle:mysql:5.6.19
cpe:/o:oracle:solaris:11.3

Date published: 2014-10-15T11:55:08.087-04:00

Date last modified: 2017-01-02T21:59:08.827-05:00

CVSS Score: 3.3

Principal attack vector: NETWORK

Complexity:  LOW

Reference URL: http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html

Summary: Unspecified vulnerability in Oracle MySQL Server 5.5.38 and earlier and 5.6.19 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:REPLICATION ROW FORMAT BINARY LOG DML.