Vulnerability Name: | CVE-2016-0504 (CCN-109974) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2015-12-09 | ||||||||||||||||||||||||||||||||||||
Published: | 2016-01-19 | ||||||||||||||||||||||||||||||||||||
Updated: | 2018-10-30 | ||||||||||||||||||||||||||||||||||||
Summary: | Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C/E:U/RL:OF/RC:C)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-0504 Source: SUSE Type: Third Party Advisory openSUSE-SU-2016:0367 Source: SUSE Type: UNKNOWN openSUSE-SU-2016:0377 Source: CCN Type: RHSA-2016-0705 Critical: rh-mysql56-mysql security update Source: REDHAT Type: Third Party Advisory RHSA-2016:0705 Source: CCN Type: IBM Security Bulletin 1978207 (Security Guardium) IBM Security Guardium is affected by OpenSource Oracle MySQL Vulnerability (multiple CVEs) Source: CCN Type: Oracle Critical Patch Update Advisory - January 2016 Oracle Critical Patch Update Advisory - January 2016 Source: CONFIRM Type: Vendor Advisory http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html Source: BID Type: UNKNOWN 81077 Source: SECTRACK Type: UNKNOWN 1034708 Source: UBUNTU Type: Third Party Advisory USN-2881-1 Source: XF Type: UNKNOWN oracle-cpujan2016-cve20160504(109974) Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-0504 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |