2.1 CVE-2012-0492
Une vulnérabilité non spécifiée dans le composant MySQL Server dans Oracle MySQL 5.1.x et 5.5.x permet à des utilisateurs authentifiés distants d'affecter la disponibilité via des vecteurs inconnus, une vulnérabilité différente de CVE-2012-0112, CVE-2012-0115, CVE-2012-0119, CVE-2012-0120 et CVE-2012-0485.
https://nvd.nist.gov/vuln/detail/CVE-2012-0492
Catégories
CWE-NVD-noinfo
Références
BID
CONFIRM
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=659687 |
http://www.oracle.com/technetwork/topics/security/cpujan2012-366304.html Vendor Advisory |
DEBIAN
GENTOO
OSVDB
SECUNIA
UBUNTU
XF
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:mysql:mysql:5.1.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.1.23:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.1.31:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.1.32:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.1.34:*:*:*:*:*:*:* | ||
cpe:2.3:a:mysql:mysql:5.1.37:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.16:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.21:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.22:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.23:a:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.24:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.25:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.26:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.27:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.28:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.29:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.30:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.31:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.33:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.34:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.35:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.36:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.37:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.38:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.39:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.40:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.40:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.41:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.42:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.43:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.43:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.44:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.45:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.46:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.46:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.47:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.48:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.49:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.49:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.50:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.51:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.52:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.52:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.53:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.54:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.55:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.56:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.57:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.58:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.59:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.60:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.1.61:*:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:a:oracle:mysql:5.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.10:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.11:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.12:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.13:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.14:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.15:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.16:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.17:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.18:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.19:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.20:*:*:*:*:*:*:* | ||
cpe:2.3:a:oracle:mysql:5.5.21:*:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
Pas d'exploit connu |
Autres (github, ...)
Url |
---|
Pas d'exploit connu |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | sévérité |
---|---|---|
Pas d'entrée |
MITRE
Sherlock® flash
Prenez une photo de votre réseau informatique en quelques clics !
La solution d'audit Sherlock® flash vous permet de réaliser un audit pour renforcer la sécurité de votre parc informatique. Analyse des vulnérabilités de vos équipements physiques et virtuels. Planification des correctifs par niveau de priorité et temps disponible. Rapports détaillés et intuitifs.
