CVE-2014-0433
Published Jan 15, 2014
Last updated 7 years ago
Overview
- Description
- Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.6.13 and earlier allows remote attackers to affect availability via unknown vectors related to Thread Pooling.
- Source
- secalert_us@oracle.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "115833AB-D7B8-4438-80EF-9D8BF6F7DB23", "versionEndIncluding": "5.6.13" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0089EDF-4806-417D-A4F1-63FF03C5AEF3" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "898A5CD5-83A5-4335-835F-759F82862753" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C851FA0E-357E-4B9E-A441-9C74B3526B37" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B12FA18C-AB93-4522-AA2C-303342452E59" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6FD31981-E3ED-41D0-92EB-ABA7490D60E5" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E918FF1-8B40-4DC3-9269-1D3BFD18C58D" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BCD7C2D-49E9-4D78-90CF-F747A1584269" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7956E471-E98A-4527-A5F4-863210E09D5A" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "615F499A-5C33-4E79-80FA-9A1453D8A3D4" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4AD40EA2-F432-4F89-9E59-0DB4D415CA85" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41494A2D-4BBC-4C3B-841F-878C2430A444" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A62DA4D8-27B4-4026-9035-75AC35F58439" }, { "criteria": "cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6DF5346-DC9A-4615-BEAC-2F5FD57C3B6B" } ], "operator": "OR" } ] } ]