← Back to CVEs
CVE-2013-0375
MEDIUM5.4
Description
Unspecified vulnerability in the Server component in Oracle MySQL 5.1.66 and earlier, and 5.1.28 and earlier, allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Server Replication.
CVE Details
CVSS v3.1 Score5.4
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published1/17/2013
Last Modified4/11/2025
Sourcenvd
Honeypot Sightings0
Affected Products
canonical:ubuntu_linuxmariadb:mariadboracle:mysqlredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_workstation
References
http://rhn.redhat.com/errata/RHSA-2013-0219.html(secalert_us@oracle.com)
http://secunia.com/advisories/53372(secalert_us@oracle.com)
http://security.gentoo.org/glsa/glsa-201308-06.xml(secalert_us@oracle.com)
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150(secalert_us@oracle.com)
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html(secalert_us@oracle.com)
http://www.ubuntu.com/usn/USN-1703-1(secalert_us@oracle.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17175(secalert_us@oracle.com)
http://rhn.redhat.com/errata/RHSA-2013-0219.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/53372(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-201308-06.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/USN-1703-1(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17175(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.