mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
194 lines
6.4 KiB
JSON
194 lines
6.4 KiB
JSON
{
|
|
"id": "CVE-2013-3807",
|
|
"sourceIdentifier": "secalert_us@oracle.com",
|
|
"published": "2013-07-17T13:41:16.910",
|
|
"lastModified": "2024-11-21T01:54:20.280",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.11 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Server Privileges."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad sin especificar en el componente MySQL Server en Oracle MySQL 5.6.11 y anteriores, permite a usuarios autenticados remotamente comprometer la integridad a trav\u00e9s de vectores relacionados con Server Privileges."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
|
|
"baseScore": 4.0,
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 4.9,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.6.11",
|
|
"matchCriteriaId": "7C8B14D9-8E72-4182-9AA2-5EF8F55331D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E0089EDF-4806-417D-A4F1-63FF03C5AEF3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "898A5CD5-83A5-4335-835F-759F82862753"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C851FA0E-357E-4B9E-A441-9C74B3526B37"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B12FA18C-AB93-4522-AA2C-303342452E59"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FD31981-E3ED-41D0-92EB-ABA7490D60E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2E918FF1-8B40-4DC3-9269-1D3BFD18C58D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4BCD7C2D-49E9-4D78-90CF-F747A1584269"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7956E471-E98A-4527-A5F4-863210E09D5A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "615F499A-5C33-4E79-80FA-9A1453D8A3D4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4AD40EA2-F432-4F89-9E59-0DB4D415CA85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41494A2D-4BBC-4C3B-841F-878C2430A444"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/95334",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
|
|
"source": "secalert_us@oracle.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85721",
|
|
"source": "secalert_us@oracle.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00022.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2013-10/msg00001.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00024.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00008.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://osvdb.org/95334",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
},
|
|
{
|
|
"url": "http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85721",
|
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
|
}
|
|
]
|
|
} |