Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.7 | MEDIUM | AV:N/AC:M/Au:M/C:N/I:N/A:C |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-noinfo | Primary | nvd@nist.gov |
Hyperlink | Source | Resource |
---|---|---|
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 | secalert_us@oracle.com | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html | secalert_us@oracle.com | Mailing List Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1628.html | secalert_us@oracle.com | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1629.html | secalert_us@oracle.com | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1647.html | secalert_us@oracle.com | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1665.html | secalert_us@oracle.com | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3229 | secalert_us@oracle.com | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3311 | secalert_us@oracle.com | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:227 | secalert_us@oracle.com | Broken Link Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html | secalert_us@oracle.com | Vendor Advisory |
http://www.securitytracker.com/id/1032121 | secalert_us@oracle.com | Broken Link Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2575-1 | secalert_us@oracle.com | Third Party Advisory |
https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/ | secalert_us@oracle.com | Release Notes Third Party Advisory |
https://security.gentoo.org/glsa/201507-19 | secalert_us@oracle.com | Third Party Advisory |
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00026.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1628.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1629.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1647.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1665.html | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3229 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.debian.org/security/2015/dsa-3311 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.mandriva.com/security/advisories?name=MDVSA-2015:227 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
http://www.securitytracker.com/id/1032121 | af854a3a-2127-422b-91ae-364da2661108 | Broken Link Third Party Advisory VDB Entry |
http://www.ubuntu.com/usn/USN-2575-1 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
https://mariadb.com/kb/en/mariadb/mariadb-5543-release-notes/ | af854a3a-2127-422b-91ae-364da2661108 | Release Notes Third Party Advisory |
https://security.gentoo.org/glsa/201507-19 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |