專案

一般

配置概況

一般 #788 » report-e74bc6f4-9f27-435e-9df9-364c2efd7e5f.csv

Joy Liao, 2024-06-25 09:37

 
IP,Hostname,Port,Port Protocol,CVSS,Severity,QoD,Solution Type,NVT Name,Summary,Specific Result,NVT OID,CVEs,Task ID,Task Name,Timestamp,Result ID,Impact,Solution,Affected Software/OS,Vulnerability Insight,Vulnerability Detection Method,Product Detection Result,BIDs,CERTs,Other References
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle Mysql Security Update (cpuoct2018 - 02) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See reference
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.814258,"CVE-2018-3133,CVE-2018-3174,CVE-2018-3282,CVE-2016-9843,CVE-2016-9840,CVE-2016-9841,CVE-2016-9842",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e88e455b-531a-4e82-bfdd-605c012ca0bd,"Successful exploitation will allow remote
attackers to have an impact on confidentiality, integrity and availability.","The vendor has released updates. Please see the references for
more information.","Oracle MySQL version 5.5.x through 5.5.61,
5.6.x through 5.6.41, 5.7.x through 5.7.23 and 8.0.x through 8.0.12.","Multiple flaws exist due to:

- An unspecified error within 'InnoDB (zlib)' component of MySQL Server.

- An unspecified error within 'Server: Parser' component of MySQL Server.

- An unspecified error within 'Client programs' component of MySQL Server.

- An unspecified error within 'Server: Storage Engines' component of MySQL Server.","Checks if a vulnerable version is present
on the target host.
Details:
Oracle Mysql Security Update (cpuoct2018 - 02) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.814258)
Version used: 2022-06-24T17:38:38+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0998,DFN-CERT-2020-1536,DFN-CERT-2019-1614,DFN-CERT-2019-1588,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0592,DFN-CERT-2019-0484,DFN-CERT-2019-0463,DFN-CERT-2019-0112,DFN-CERT-2018-2435,DFN-CERT-2018-2273,DFN-CERT-2018-2110,DFN-CERT-2018-1408,DFN-CERT-2018-0659,DFN-CERT-2018-0645,DFN-CERT-2018-0039,DFN-CERT-2017-2300,DFN-CERT-2017-2268,DFN-CERT-2017-1825,DFN-CERT-2017-1785,DFN-CERT-2017-1692,DFN-CERT-2017-1655,DFN-CERT-2017-1097,DFN-CERT-2017-0904,DFN-CERT-2017-0806,DFN-CERT-2016-2109,WID-SEC-2024-1232,WID-SEC-2023-1594,WID-SEC-2022-0673,CB-K22/0045,CB-K20/0714,CB-K18/1005,CB-K18/0799,CB-K18/0030,CB-K17/2199,CB-K17/2168,CB-K17/1745,CB-K17/1709,CB-K17/1622,CB-K17/1585,CB-K17/1062,CB-K17/0877,CB-K17/0784,CB-K16/1996",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.35 / 8.0 <= 8.0.26 Security Update (cpuoct2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.36
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117741,"CVE-2021-3711,CVE-2021-22926,CVE-2021-35604,CVE-2021-35624,CVE-2021-22922,CVE-2021-22923,CVE-2021-22924,CVE-2021-22925,CVE-2021-22945,CVE-2021-22946,CVE-2021-22947,CVE-2021-3712",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fa9eb0d7-fb83-4b71-94b2-2ba00c5d48e8,"","Update to version 5.7.36, 8.0.27 or later.","Oracle MySQL Server version 5.7.35 and prior and 8.0 through 8.0.26.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.35 / 8.0 <= 8.0.26 Security Update (cpuoct2021) -...
(OID: 1.3.6.1.4.1.25623.1.0.117741)
Version used: 2021-10-23T16:58:44+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0573,DFN-CERT-2024-0147,DFN-CERT-2023-0469,DFN-CERT-2022-2825,DFN-CERT-2022-2376,DFN-CERT-2022-2350,DFN-CERT-2022-2086,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-2047,DFN-CERT-2022-1892,DFN-CERT-2022-1692,DFN-CERT-2022-1597,DFN-CERT-2022-1582,DFN-CERT-2022-1571,DFN-CERT-2022-1469,DFN-CERT-2022-1386,DFN-CERT-2022-1241,DFN-CERT-2022-1215,DFN-CERT-2022-1143,DFN-CERT-2022-0933,DFN-CERT-2022-0922,DFN-CERT-2022-0867,DFN-CERT-2022-0835,DFN-CERT-2022-0666,DFN-CERT-2022-0586,DFN-CERT-2022-0437,DFN-CERT-2022-0369,DFN-CERT-2022-0122,DFN-CERT-2022-0120,DFN-CERT-2022-0118,DFN-CERT-2022-0112,DFN-CERT-2022-0076,DFN-CERT-2022-0052,DFN-CERT-2022-0031,DFN-CERT-2021-2527,DFN-CERT-2021-2502,DFN-CERT-2021-2481,DFN-CERT-2021-2438,DFN-CERT-2021-2434,DFN-CERT-2021-2403,DFN-CERT-2021-2394,DFN-CERT-2021-2369,DFN-CERT-2021-2329,DFN-CERT-2021-2223,DFN-CERT-2021-2216,DFN-CERT-2021-2214,DFN-CERT-2021-2189,DFN-CERT-2021-2188,DFN-CERT-2021-2185,DFN-CERT-2021-2167,DFN-CERT-2021-1996,DFN-CERT-2021-1931,DFN-CERT-2021-1917,DFN-CERT-2021-1915,DFN-CERT-2021-1871,DFN-CERT-2021-1803,DFN-CERT-2021-1799,DFN-CERT-2021-1743,DFN-CERT-2021-1593,DFN-CERT-2021-1580,DFN-CERT-2021-1568,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2024-0556,WID-SEC-2023-2229,WID-SEC-2023-1821,WID-SEC-2023-1350,WID-SEC-2023-1030,WID-SEC-2023-0530,WID-SEC-2022-2354,WID-SEC-2022-2000,WID-SEC-2022-1908,WID-SEC-2022-1894,WID-SEC-2022-1515,WID-SEC-2022-1461,WID-SEC-2022-1335,WID-SEC-2022-1308,WID-SEC-2022-1228,WID-SEC-2022-1225,WID-SEC-2022-1056,WID-SEC-2022-0875,WID-SEC-2022-0874,WID-SEC-2022-0751,WID-SEC-2022-0676,WID-SEC-2022-0673,WID-SEC-2022-0602,WID-SEC-2022-0530,WID-SEC-2022-0432,WID-SEC-2022-0400,WID-SEC-2022-0393,WID-SEC-2022-0302,WID-SEC-2022-0101,WID-SEC-2022-0094,CB-K22/0473,CB-K22/0469,CB-K22/0316,CB-K22/0224,CB-K22/0077,CB-K22/0072,CB-K22/0062,CB-K22/0045,CB-K22/0030,CB-K22/0011,CB-K21/1268,CB-K21/1179,CB-K21/1161,CB-K21/1087,CB-K21/0994,CB-K21/0991,CB-K21/0969,CB-K21/0907,CB-K21/0897,CB-K21/0797",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.807927,"CVE-2016-0655,CVE-2016-0639,CVE-2016-0705,CVE-2015-3197,CVE-2016-0702,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ea420eb-42a4-4a3f-9714-fe73391068f4,"Successful exploitation will allow an authenticated remote attacker to
affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.29 and 5.7 through 5.7.11.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpuapr201...
(OID: 1.3.6.1.4.1.25623.1.0.807927)
Version used: 2021-10-13T19:01:26+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-0228,DFN-CERT-2018-2564,DFN-CERT-2018-1929,DFN-CERT-2018-1907,DFN-CERT-2018-1675,DFN-CERT-2018-1048,DFN-CERT-2018-1036,DFN-CERT-2018-0952,DFN-CERT-2018-0620,DFN-CERT-2018-0512,DFN-CERT-2018-0096,DFN-CERT-2017-0947,DFN-CERT-2017-0797,DFN-CERT-2016-2081,DFN-CERT-2016-1778,DFN-CERT-2016-1713,DFN-CERT-2016-1401,DFN-CERT-2016-1389,DFN-CERT-2016-1216,DFN-CERT-2016-1175,DFN-CERT-2016-1174,DFN-CERT-2016-1168,DFN-CERT-2016-1103,DFN-CERT-2016-1026,DFN-CERT-2016-0994,DFN-CERT-2016-0951,DFN-CERT-2016-0903,DFN-CERT-2016-0890,DFN-CERT-2016-0845,DFN-CERT-2016-0841,DFN-CERT-2016-0815,DFN-CERT-2016-0803,DFN-CERT-2016-0789,DFN-CERT-2016-0765,DFN-CERT-2016-0699,DFN-CERT-2016-0698,DFN-CERT-2016-0695,DFN-CERT-2016-0647,DFN-CERT-2016-0644,DFN-CERT-2016-0638,DFN-CERT-2016-0499,DFN-CERT-2016-0496,DFN-CERT-2016-0495,DFN-CERT-2016-0465,DFN-CERT-2016-0459,DFN-CERT-2016-0453,DFN-CERT-2016-0451,DFN-CERT-2016-0415,DFN-CERT-2016-0403,DFN-CERT-2016-0388,DFN-CERT-2016-0360,DFN-CERT-2016-0359,DFN-CERT-2016-0357,DFN-CERT-2016-0166,WID-SEC-2023-1956,WID-SEC-2023-1594,WID-SEC-2023-0427,CB-K19/0354,CB-K18/0482,CB-K18/0094,CB-K17/0917,CB-K17/0772,CB-K16/1972,CB-K16/1678,CB-K16/1617,CB-K16/1315,CB-K16/1305,CB-K16/1141,CB-K16/1107,CB-K16/1103,CB-K16/1102,CB-K16/1097,CB-K16/1038,CB-K16/0955,CB-K16/0936,CB-K16/0894,CB-K16/0792,CB-K16/0791,CB-K16/0763,CB-K16/0750,CB-K16/0736,CB-K16/0716,CB-K16/0651,CB-K16/0650,CB-K16/0646,CB-K16/0600,CB-K16/0598,CB-K16/0597,CB-K16/0459,CB-K16/0457,CB-K16/0456,CB-K16/0433,CB-K16/0424,CB-K16/0415,CB-K16/0413,CB-K16/0374,CB-K16/0367,CB-K16/0331,CB-K16/0329,CB-K16/0328,CB-K16/0146",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.38 / 8.0 <= 8.0.29 Security Update (cpujul2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.39
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.148511,"CVE-2022-1292,CVE-2022-27778,CVE-2018-25032,CVE-2022-21515",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,2298cd52-2b43-42ab-a2fb-1a724165daf1,"","Update to version 5.7.39, 8.0.30 or later.","Oracle MySQL Server version 5.7.38 and prior and 8.0 through
8.0.29.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.38 / 8.0 <= 8.0.29 Security Update (cpujul2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.148511)
Version used: 2022-07-22T18:11:18+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0998,DFN-CERT-2024-0790,DFN-CERT-2024-0147,DFN-CERT-2023-3028,DFN-CERT-2023-2667,DFN-CERT-2023-2600,DFN-CERT-2023-2599,DFN-CERT-2023-2571,DFN-CERT-2023-0553,DFN-CERT-2023-0430,DFN-CERT-2023-0372,DFN-CERT-2023-0121,DFN-CERT-2023-0119,DFN-CERT-2023-0100,DFN-CERT-2022-2799,DFN-CERT-2022-2668,DFN-CERT-2022-2376,DFN-CERT-2022-2323,DFN-CERT-2022-2309,DFN-CERT-2022-2305,DFN-CERT-2022-2268,DFN-CERT-2022-2254,DFN-CERT-2022-2150,DFN-CERT-2022-2111,DFN-CERT-2022-2094,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-2066,DFN-CERT-2022-2059,DFN-CERT-2022-2047,DFN-CERT-2022-1992,DFN-CERT-2022-1905,DFN-CERT-2022-1875,DFN-CERT-2022-1837,DFN-CERT-2022-1646,DFN-CERT-2022-1614,DFN-CERT-2022-1609,DFN-CERT-2022-1520,DFN-CERT-2022-1476,DFN-CERT-2022-1425,DFN-CERT-2022-1310,DFN-CERT-2022-1304,DFN-CERT-2022-1267,DFN-CERT-2022-1264,DFN-CERT-2022-1116,DFN-CERT-2022-1115,DFN-CERT-2022-1114,DFN-CERT-2022-1103,DFN-CERT-2022-1081,DFN-CERT-2022-1076,DFN-CERT-2022-1054,DFN-CERT-2022-1049,DFN-CERT-2022-0986,DFN-CERT-2022-0768,DFN-CERT-2022-0716,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2023-2723,WID-SEC-2023-2229,WID-SEC-2023-1969,WID-SEC-2023-1784,WID-SEC-2023-1542,WID-SEC-2023-1432,WID-SEC-2023-1424,WID-SEC-2023-1350,WID-SEC-2023-1021,WID-SEC-2023-0141,WID-SEC-2023-0132,WID-SEC-2022-1775,WID-SEC-2022-1772,WID-SEC-2022-1767,WID-SEC-2022-1461,WID-SEC-2022-1438,WID-SEC-2022-1335,WID-SEC-2022-1245,WID-SEC-2022-1228,WID-SEC-2022-1068,WID-SEC-2022-1057,WID-SEC-2022-0833,WID-SEC-2022-0826,WID-SEC-2022-0767,WID-SEC-2022-0755,WID-SEC-2022-0736,WID-SEC-2022-0735,WID-SEC-2022-0677,WID-SEC-2022-0554,WID-SEC-2022-0393,WID-SEC-2022-0277,WID-SEC-2022-0071,WID-SEC-2022-0005,CB-K22/0619,CB-K22/0570,CB-K22/0536,CB-K22/0386",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.5.52 / 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809386,"CVE-2016-5584,CVE-2016-6662,CVE-2016-7440",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8286c2d2-60df-4195-bd77-51588593964a,"Successful exploitation of this vulnerability will allow a remote
user to access restricted data.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.52 and prior, 5.6 through 5.6.33 and 5.7 through 5.7.15.","Multiple flaws exist due to multiple unspecified errors in the
'Server: Security: Encryption' and 'Server: Logging' components.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.52 / 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.809386)
Version used: 2021-10-13T19:01:26+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-1473,DFN-CERT-2017-0138,DFN-CERT-2017-0060,DFN-CERT-2016-1950,DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1790,DFN-CERT-2016-1753,DFN-CERT-2016-1714,DFN-CERT-2016-1540,DFN-CERT-2016-1479,CB-K17/0139,CB-K17/0055,CB-K16/1846,CB-K16/1755,CB-K16/1742,CB-K16/1714,CB-K16/1655,CB-K16/1624,CB-K16/1448,CB-K16/1392",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.31 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to a vulnerability in InnoDB
(zlib).","Installed version: 5.6.10
Fixed version: 5.7.42
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149536,"CVE-2022-37434",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,285c784f-e8ce-4f6b-9b0f-9854920f1bca,"","Update to version 5.7.42, 8.0.32 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
8.0.31.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.31 Security Update (cpuapr2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149536)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0998,DFN-CERT-2024-0790,DFN-CERT-2024-0125,DFN-CERT-2023-3028,DFN-CERT-2023-2816,DFN-CERT-2023-2799,DFN-CERT-2023-1643,DFN-CERT-2023-0885,DFN-CERT-2023-0881,DFN-CERT-2023-0553,DFN-CERT-2023-0122,DFN-CERT-2023-0119,DFN-CERT-2023-0105,DFN-CERT-2022-2799,DFN-CERT-2022-2421,DFN-CERT-2022-2415,DFN-CERT-2022-2366,DFN-CERT-2022-2365,DFN-CERT-2022-2364,DFN-CERT-2022-2363,DFN-CERT-2022-2323,DFN-CERT-2022-1841,DFN-CERT-2022-1710,WID-SEC-2024-0794,WID-SEC-2024-0122,WID-SEC-2024-0120,WID-SEC-2024-0064,WID-SEC-2023-2031,WID-SEC-2023-1812,WID-SEC-2023-1791,WID-SEC-2023-1790,WID-SEC-2023-1783,WID-SEC-2023-1728,WID-SEC-2023-1542,WID-SEC-2023-1350,WID-SEC-2023-1033,WID-SEC-2023-1031,WID-SEC-2023-1021,WID-SEC-2023-1016,WID-SEC-2023-0140,WID-SEC-2023-0137,WID-SEC-2023-0132,WID-SEC-2023-0126,WID-SEC-2023-0125,WID-SEC-2022-1888,WID-SEC-2022-1438,WID-SEC-2022-0929",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpujan2023) - Windows","Oracle MySQL Server is prone to a vulnerability in libcurl.","Installed version: 5.6.10
Fixed version: 5.7.41
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149170,"CVE-2022-32221,CVE-2022-35260,CVE-2022-42915,CVE-2022-42916",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a0b87069-4cf9-4632-8b27-c00eb1750e35,"","Update to version 5.7.41, 8.0.32 or later.","Oracle MySQL Server version 5.7.40 and prior and 8.0 through
8.0.31.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpujan2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149170)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-1947,DFN-CERT-2023-1636,DFN-CERT-2023-1230,DFN-CERT-2023-0898,DFN-CERT-2023-0884,DFN-CERT-2023-0372,DFN-CERT-2023-0278,DFN-CERT-2023-0216,DFN-CERT-2023-0214,DFN-CERT-2023-0157,DFN-CERT-2023-0156,DFN-CERT-2023-0105,DFN-CERT-2022-2799,DFN-CERT-2022-2401,DFN-CERT-2022-2400,DFN-CERT-2022-2393,DFN-CERT-2022-2391,WID-SEC-2024-0794,WID-SEC-2023-2917,WID-SEC-2023-2229,WID-SEC-2023-2031,WID-SEC-2023-1728,WID-SEC-2023-1614,WID-SEC-2023-1424,WID-SEC-2023-1350,WID-SEC-2023-1026,WID-SEC-2023-0296,WID-SEC-2023-0189,WID-SEC-2023-0137,WID-SEC-2023-0126,WID-SEC-2022-2372,WID-SEC-2022-1862",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809376,"CVE-2016-6304,CVE-2016-2177,CVE-2016-2178,CVE-2016-2179,CVE-2016-2180,CVE-2016-2181,CVE-2016-2182,CVE-2016-2183,CVE-2016-6302,CVE-2016-6303,CVE-2016-6306",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7567dddd-f3a7-4188-b75b-ae15c7276675,"Successful exploitation of this vulnerability will allow remote
attackers to cause a denial of service (memory consumption).","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.33 and 5.7 through 5.7.15.","The flaw exists due to improper validation of large OCSP Status
Request extensions.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Update (cpuoct201...
(OID: 1.3.6.1.4.1.25623.1.0.809376)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-1618,DFN-CERT-2021-0775,DFN-CERT-2021-0770,DFN-CERT-2021-0274,DFN-CERT-2020-2141,DFN-CERT-2020-0368,DFN-CERT-2019-1455,DFN-CERT-2019-0068,DFN-CERT-2018-1377,DFN-CERT-2018-1296,DFN-CERT-2018-0323,DFN-CERT-2018-0100,DFN-CERT-2017-2070,DFN-CERT-2017-1954,DFN-CERT-2017-1831,DFN-CERT-2017-1821,DFN-CERT-2017-1785,DFN-CERT-2017-1626,DFN-CERT-2017-1485,DFN-CERT-2017-1326,DFN-CERT-2017-1239,DFN-CERT-2017-1238,DFN-CERT-2017-1124,DFN-CERT-2017-0988,DFN-CERT-2017-0968,DFN-CERT-2017-0947,DFN-CERT-2017-0946,DFN-CERT-2017-0904,DFN-CERT-2017-0816,DFN-CERT-2017-0746,DFN-CERT-2017-0677,DFN-CERT-2017-0675,DFN-CERT-2017-0611,DFN-CERT-2017-0609,DFN-CERT-2017-0522,DFN-CERT-2017-0519,DFN-CERT-2017-0482,DFN-CERT-2017-0402,DFN-CERT-2017-0394,DFN-CERT-2017-0351,DFN-CERT-2017-0178,DFN-CERT-2017-0154,DFN-CERT-2017-0093,DFN-CERT-2017-0090,DFN-CERT-2017-0089,DFN-CERT-2017-0088,DFN-CERT-2017-0086,DFN-CERT-2016-2081,DFN-CERT-2016-2063,DFN-CERT-2016-1943,DFN-CERT-2016-1937,DFN-CERT-2016-1898,DFN-CERT-2016-1859,DFN-CERT-2016-1734,DFN-CERT-2016-1732,DFN-CERT-2016-1726,DFN-CERT-2016-1717,DFN-CERT-2016-1715,DFN-CERT-2016-1714,DFN-CERT-2016-1588,DFN-CERT-2016-1555,DFN-CERT-2016-1391,DFN-CERT-2016-1136,WID-SEC-2024-1277,WID-SEC-2024-0214,WID-SEC-2024-0213,WID-SEC-2024-0212,WID-SEC-2024-0211,WID-SEC-2024-0210,WID-SEC-2024-0209,WID-SEC-2024-0064,WID-SEC-2022-1955,CB-K21/1094,CB-K20/1023,CB-K20/0321,CB-K20/0314,CB-K20/0157,CB-K19/0618,CB-K19/0615,CB-K18/0296,CB-K18/0098,CB-K17/1980,CB-K17/1871,CB-K17/1753,CB-K17/1750,CB-K17/1709,CB-K17/1558,CB-K17/1423,CB-K17/1273,CB-K17/1202,CB-K17/1196,CB-K17/1092,CB-K17/0955,CB-K17/0939,CB-K17/0917,CB-K17/0915,CB-K17/0877,CB-K17/0796,CB-K17/0724,CB-K17/0661,CB-K17/0657,CB-K17/0582,CB-K17/0581,CB-K17/0506,CB-K17/0504,CB-K17/0467,CB-K17/0394,CB-K17/0391,CB-K17/0345,CB-K17/0175,CB-K17/0149,CB-K17/0098,CB-K17/0097,CB-K17/0089,CB-K17/0086,CB-K17/0082,CB-K16/1972,CB-K16/1958,CB-K16/1837,CB-K16/1830,CB-K16/1784,CB-K16/1755,CB-K16/1638,CB-K16/1635,CB-K16/1630,CB-K16/1624,CB-K16/1622,CB-K16/1620,CB-K16/1500,CB-K16/1465,CB-K16/1307,CB-K16/1066",""
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.34, 8.1.0 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.44
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.151218,"CVE-2023-38545,CVE-2023-22084,CVE-2023-38546",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,875b89c7-f0b9-4764-ad6f-df54d23a1d3e,"","Update to version 5.7.44, 8.0.35, 8.1.1 or later.","Oracle MySQL Server version 5.7.43 and prior, 8.x through
8.0.34 and 8.1.0.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.34, 8.1.0 Security Update (cpuoct2...
(OID: 1.3.6.1.4.1.25623.1.0.151218)
Version used: 2023-10-28T00:11:33+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-1601,DFN-CERT-2024-1517,DFN-CERT-2024-1188,DFN-CERT-2024-1090,DFN-CERT-2024-1025,DFN-CERT-2024-0963,DFN-CERT-2024-0869,DFN-CERT-2024-0593,DFN-CERT-2024-0454,DFN-CERT-2024-0376,DFN-CERT-2024-0220,DFN-CERT-2024-0185,DFN-CERT-2024-0184,DFN-CERT-2024-0181,DFN-CERT-2024-0133,DFN-CERT-2024-0132,DFN-CERT-2024-0127,DFN-CERT-2024-0108,DFN-CERT-2023-3124,DFN-CERT-2023-3071,DFN-CERT-2023-3064,DFN-CERT-2023-2988,DFN-CERT-2023-2941,DFN-CERT-2023-2819,DFN-CERT-2023-2763,DFN-CERT-2023-2681,DFN-CERT-2023-2680,DFN-CERT-2023-2643,DFN-CERT-2023-2536,DFN-CERT-2023-2475,DFN-CERT-2023-2458,WID-SEC-2024-1226,WID-SEC-2024-1086,WID-SEC-2024-0893,WID-SEC-2024-0290,WID-SEC-2024-0178,WID-SEC-2024-0175,WID-SEC-2024-0123,WID-SEC-2024-0119,WID-SEC-2024-0110,WID-SEC-2023-2788,WID-SEC-2023-2690,WID-SEC-2023-2570",""
192.168.8.77,,3306,tcp,8.1,High,80,"VendorFix","Oracle MySQL Server <= 5.7.34 / 8.0 <= 8.0.25 Security Update (cpujul2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.35
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.146355,"CVE-2021-22901,CVE-2019-17543,CVE-2021-2389,CVE-2021-2390,CVE-2021-2356,CVE-2021-2385,CVE-2021-2342,CVE-2021-2372,CVE-2021-22897,CVE-2021-22898",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b6a9ab5e-1afe-45ac-b5af-532446522473,"","Update to version 5.7.35, 8.0.26 or later.","Oracle MySQL Server version 5.7.34 and prior and 8.0 through 8.0.25.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.34 / 8.0 <= 8.0.25 Security Update (cpujul2021) -...
(OID: 1.3.6.1.4.1.25623.1.0.146355)
Version used: 2023-10-21T00:09:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-1892,DFN-CERT-2022-1692,DFN-CERT-2022-1597,DFN-CERT-2022-1241,DFN-CERT-2022-0933,DFN-CERT-2022-0872,DFN-CERT-2022-0666,DFN-CERT-2022-0076,DFN-CERT-2022-0074,DFN-CERT-2021-2527,DFN-CERT-2021-2438,DFN-CERT-2021-2369,DFN-CERT-2021-2185,DFN-CERT-2021-2155,DFN-CERT-2021-1743,DFN-CERT-2021-1677,DFN-CERT-2021-1593,DFN-CERT-2021-1580,DFN-CERT-2021-1537,DFN-CERT-2021-1329,DFN-CERT-2021-1174,DFN-CERT-2021-1165,DFN-CERT-2021-1157,DFN-CERT-2021-1151,DFN-CERT-2021-1148,DFN-CERT-2021-1045,DFN-CERT-2019-2216,WID-SEC-2023-2229,WID-SEC-2023-1350,WID-SEC-2023-0063,WID-SEC-2022-1963,WID-SEC-2022-0873,CB-K22/0044,CB-K21/0813,CB-K21/0770",""
192.168.8.77,,3306,tcp,8.1,High,80,"VendorFix","Oracle MySQL Server <= 5.5.49 / 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.808588,"CVE-2016-3477,CVE-2016-3521,CVE-2016-3615,CVE-2016-5440",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ba6c3ead-1a97-402c-88c6-c2f0449e16f5,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.49 and prior, 5.6 through 5.6.30 and 5.7 through 5.7.12.","Multiple unspecified errors exist in the 'MySQL Server' component
via unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.49 / 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.808588)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1540,DFN-CERT-2016-1217,DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1755,CB-K16/1742,CB-K16/1448,CB-K16/1146,CB-K16/1122,CB-K16/1100",""
192.168.8.77,,3306,tcp,7.7,High,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.810882,"CVE-2017-3309,CVE-2017-3308,CVE-2017-3329,CVE-2017-3456,CVE-2017-3453,CVE-2017-3600,CVE-2017-3462,CVE-2017-3463,CVE-2017-3461,CVE-2017-3464",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,3e2306f4-584c-4222-96e3-95db50916105,"Successful exploitation of this vulnerability
will allow remote attackers to have impact on availability, confidentiality
and integrity.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.54 and earlier,
5.6.35 and earlier, 5.7.17 and earlier on Windows","Multiple flaws exist due to multiple
unspecified errors in the 'Server: DML', 'Server: Optimizer',
'Server: Thread Pooling', 'Client mysqldump', 'Server: Security: Privileges'
components of the application.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2017-3236618) 02 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.810882)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1630,DFN-CERT-2017-1465,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-0959,DFN-CERT-2017-0675,CB-K18/0224,CB-K17/1732,CB-K17/1604,CB-K17/1563,CB-K17/1401,CB-K17/1298,CB-K17/1239,CB-K17/0927,CB-K17/0657",""
192.168.8.77,,3306,tcp,7.7,High,80,"VendorFix","Oracle Mysql Security Updates (apr2018-3678067) 04 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.813148,"CVE-2018-2761,CVE-2018-2771,CVE-2018-2781,CVE-2018-2773,CVE-2018-2817,CVE-2018-2813,CVE-2018-2755,CVE-2018-2819,CVE-2018-2818",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8f187bcc-3e27-4fe6-9813-294f6cd781b5,"Successful exploitation of this
vulnerability will allow remote attackers to have an impact on confidentiality,
integrity and availability.","Apply the latest patch from vendor. Please see the references for more information.","Oracle MySQL version 5.5.59 and earlier,
5.6.39 and earlier, 5.7.21 and earlier on Windows","Multiple flaws exist due to

- Multiple errors in the 'Client programs' component of MySQL Server.

- An error in the 'Server: Locking' component of MySQL Server.

- An error in the 'Server: Optimizer' component of MySQL Server.

- Multiple errors in the 'Server: DDL' component of MySQL Server.

- Multiple errors in the 'Server: Replication' component of MySQL Server.

- An error in the 'InnoDB' component of MySQL Server.

- An error in the 'Server : Security : Privileges' component of MySQL Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2018-3678067) 04 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.813148)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0913,DFN-CERT-2018-0723,WID-SEC-2023-1594,CB-K18/0608",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Denial Of Service Vulnerability (Feb 2017) - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.21
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.810603,"CVE-2017-3302",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7f5fe926-2c03-4637-93ea-a6ff66ff13cd,"Successful exploitation of this vulnerability
will allow attackers to cause crash of applications using that MySQL client.","Upgrade to Oracle MySQL version 5.6.21 or
5.7.5 or later.","Oracle MySQL version before 5.6.21 and
5.7.x before 5.7.5 on Windows","Multiple errors exist as,

- In sql-common/client.c script 'mysql_prune_stmt_list' function, the for loop
adds elements to pruned_list without removing it from the existing list.

- If application gets disconnected just before it tries to prepare a new
statement, 'mysql_prune_stmt_list' tries to detach all previously prepared
statements.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Denial Of Service Vulnerability (Feb 2017) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.810603)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1675,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-0675,DFN-CERT-2017-0430,CB-K18/0224,CB-K17/1604,CB-K17/1298,CB-K17/1239,CB-K17/0657,CB-K17/0423",""
192.168.8.111,,445,tcp,7.5,High,99,"WillNotFix","Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability","Microsoft Windows is prone to an authentication bypass
vulnerability via SMB/NETBIOS.","It was possible to login at the share 'IPC$' with an empty login and password.
",1.3.6.1.4.1.25623.1.0.801991,"CVE-1999-0519",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,bdec3ed4-0c30-481e-a99d-74b71b4a49a4,"Successful exploitation could allow attackers to use shares to
cause the system to crash.","No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore.
General solution options are to upgrade to a newer release, disable respective
features, remove the product or replace the product by another one.

A workaround is to,

- Disable null session login.

- Remove the share.

- Enable passwords on the share.","'- Microsoft Windows 95

- Microsoft Windows 98

- Microsoft Windows NT

- Microsoft Windows 2000

- Microsoft Windows in other implementations / versions might be affected as well","The flaw is due to an SMB share, allows full access to Guest users.
If the Guest account is enabled, anyone can access the computer without a valid user account or password.","
Details:
Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerabili...
(OID: 1.3.6.1.4.1.25623.1.0.801991)
Version used: 2023-07-28T13:05:23+08:00
","","","",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 01 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.810880,"CVE-2017-3302",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,49769af1-68d6-4454-b3ab-e378ba90e30a,"Successful exploitation of this vulnerability
will allow remote attackers to cause the affected application to crash,
resulting in a denial-of-service condition.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.54 and earlier,
5.6.20 and earlier on Windows","The flaw exists due to some unspecified error
in the 'Server: C API' component due to failure to handle exceptional
conditions.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2017-3236618) 01 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.810880)
Version used: 2023-07-15T00:09:27+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1675,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-0675,DFN-CERT-2017-0430,CB-K18/0224,CB-K17/1604,CB-K17/1298,CB-K17/1239,CB-K17/0657,CB-K17/0423",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.808591,"CVE-2016-3471",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d85c19db-78f2-4591-85de-d642639db38f,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.45 and prior and 5.6 through 5.6.26.","An unspecified error exists in the 'MySQL Server' component via
unknown vectors related to the 'Option' sub-component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujul2016) -...
(OID: 1.3.6.1.4.1.25623.1.0.808591)
Version used: 2022-07-07T18:16:06+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1122,CB-K16/1100",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 03 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.812648,"CVE-2018-2573,CVE-2017-3737,CVE-2018-2696,CVE-2018-2590,CVE-2018-2583,CVE-2018-2612,CVE-2018-2645,CVE-2018-2703,CVE-2018-2647",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,568ecc92-9bd1-4ea9-b609-d6484b4effff,"Successful exploitation of these vulnerabilities
will allow remote attackers to conduct a denial-of-service condition, access and
modify data.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.38 and earlier,
5.7.20 and earlier on Windows","Multiple flaws exist due to

- Multiple errors in the 'Server:Security:Privileges' component.

- Multiple errors in the 'Server:Performance Schema' component.

- An error in the 'Server:Replication' component.

- An error in the 'Server:Packaging(OpenSSL)' component.

- An error in the 'Server:GIS' component.

- An error in the 'InnoDB' component.

- An error in the 'Stored Procedure' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jan2018-3236628) 03 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.812648)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1402,DFN-CERT-2018-1377,DFN-CERT-2018-1364,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-1068,DFN-CERT-2018-0759,DFN-CERT-2018-0736,DFN-CERT-2018-0733,DFN-CERT-2018-0729,DFN-CERT-2018-0725,DFN-CERT-2018-0723,DFN-CERT-2018-0696,DFN-CERT-2018-0673,DFN-CERT-2018-0536,DFN-CERT-2018-0515,DFN-CERT-2018-0424,DFN-CERT-2018-0318,DFN-CERT-2018-0212,DFN-CERT-2018-0101,DFN-CERT-2018-0064,DFN-CERT-2017-2216,WID-SEC-2024-0205,WID-SEC-2023-1594,WID-SEC-2022-0673,CB-K22/0045,CB-K18/0813,CB-K18/0808,CB-K18/0608,CB-K18/0607,CB-K18/0606,CB-K18/0605,CB-K18/0495,CB-K18/0480,CB-K18/0392,CB-K18/0301,CB-K18/0195,CB-K18/0096,CB-K18/0057,CB-K17/2122",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.43
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.151214,"CVE-2023-2650,CVE-2023-0464,CVE-2023-0465,CVE-2023-0466,CVE-2023-1255",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9acbed75-8ba9-4852-af26-a19e227ee52d,"","Update to version 5.7.43, 8.0.34 or later.","Oracle MySQL Server version 5.7.42 and prior and 8.x through
8.0.33.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpuoct2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.151214)
Version used: 2023-10-20T13:06:03+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-1067,DFN-CERT-2024-0565,DFN-CERT-2024-0147,DFN-CERT-2024-0125,DFN-CERT-2023-3071,DFN-CERT-2023-3070,DFN-CERT-2023-2749,DFN-CERT-2023-2545,DFN-CERT-2023-2536,DFN-CERT-2023-2116,DFN-CERT-2023-1947,DFN-CERT-2023-1903,DFN-CERT-2023-1720,DFN-CERT-2023-1649,DFN-CERT-2023-1642,DFN-CERT-2023-1462,DFN-CERT-2023-1428,DFN-CERT-2023-1423,DFN-CERT-2023-1332,DFN-CERT-2023-1246,DFN-CERT-2023-1245,DFN-CERT-2023-1233,DFN-CERT-2023-0999,DFN-CERT-2023-0960,DFN-CERT-2023-0929,DFN-CERT-2023-0904,DFN-CERT-2023-0782,DFN-CERT-2023-0700,DFN-CERT-2023-0645,WID-SEC-2024-0794,WID-SEC-2024-0120,WID-SEC-2024-0064,WID-SEC-2024-0053,WID-SEC-2023-2917,WID-SEC-2023-2690,WID-SEC-2023-2674,WID-SEC-2023-1794,WID-SEC-2023-1781,WID-SEC-2023-1614,WID-SEC-2023-1432,WID-SEC-2023-1323,WID-SEC-2023-1130,WID-SEC-2023-1053,WID-SEC-2023-0782,WID-SEC-2023-0732",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.807923,"CVE-2016-0668,CVE-2016-0665,CVE-2016-0661,CVE-2015-3194,CVE-2015-3195",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4ffd43a4-f5a1-4824-9822-bbc4f843e1db,"Successful exploitation will allow local users to affect availability
via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.28 and 5.7 through 5.7.10.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update (cpuapr201...
(OID: 1.3.6.1.4.1.25623.1.0.807923)
Version used: 2022-08-19T18:10:35+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1929,DFN-CERT-2018-0096,DFN-CERT-2017-0947,DFN-CERT-2016-2081,DFN-CERT-2016-1778,DFN-CERT-2016-1692,DFN-CERT-2016-1174,DFN-CERT-2016-1026,DFN-CERT-2016-0994,DFN-CERT-2016-0903,DFN-CERT-2016-0890,DFN-CERT-2016-0845,DFN-CERT-2016-0803,DFN-CERT-2016-0797,DFN-CERT-2016-0789,DFN-CERT-2016-0695,DFN-CERT-2016-0647,DFN-CERT-2016-0644,DFN-CERT-2016-0638,DFN-CERT-2016-0610,DFN-CERT-2016-0484,DFN-CERT-2016-0465,DFN-CERT-2016-0403,DFN-CERT-2016-0388,DFN-CERT-2016-0170,DFN-CERT-2015-1971,DFN-CERT-2015-1916,DFN-CERT-2015-1867,CB-K18/0094,CB-K17/0917,CB-K16/1972,CB-K16/1678,CB-K16/1593,CB-K16/1107,CB-K16/0955,CB-K16/0936,CB-K16/0791,CB-K16/0750,CB-K16/0747,CB-K16/0736,CB-K16/0646,CB-K16/0600,CB-K16/0598,CB-K16/0597,CB-K16/0562,CB-K16/0446,CB-K16/0433,CB-K16/0367,CB-K16/0158,CB-K15/1865,CB-K15/1815,CB-K15/1768",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.42
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149538,"CVE-2023-0215,CVE-2022-43551,CVE-2023-21980,CVE-2022-4304,CVE-2022-4450,CVE-2023-0286",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ae6c669-4ee8-4f1d-b23c-f01dfbcce2f7,"","Update to version 5.7.42, 8.0.33 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
8.0.32.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpuapr2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149538)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-1188,DFN-CERT-2024-0593,DFN-CERT-2024-0454,DFN-CERT-2024-0147,DFN-CERT-2024-0126,DFN-CERT-2024-0016,DFN-CERT-2023-2192,DFN-CERT-2023-1760,DFN-CERT-2023-1697,DFN-CERT-2023-1656,DFN-CERT-2023-1643,DFN-CERT-2023-1590,DFN-CERT-2023-1522,DFN-CERT-2023-1462,DFN-CERT-2023-1423,DFN-CERT-2023-1297,DFN-CERT-2023-1256,DFN-CERT-2023-1162,DFN-CERT-2023-1043,DFN-CERT-2023-1037,DFN-CERT-2023-0898,DFN-CERT-2023-0885,DFN-CERT-2023-0884,DFN-CERT-2023-0881,DFN-CERT-2023-0774,DFN-CERT-2023-0685,DFN-CERT-2023-0662,DFN-CERT-2023-0661,DFN-CERT-2023-0639,DFN-CERT-2023-0618,DFN-CERT-2023-0543,DFN-CERT-2023-0471,DFN-CERT-2023-0430,DFN-CERT-2023-0329,DFN-CERT-2023-0318,DFN-CERT-2023-0310,DFN-CERT-2023-0299,DFN-CERT-2023-0288,DFN-CERT-2023-0284,DFN-CERT-2023-0283,DFN-CERT-2022-2902,WID-SEC-2024-0794,WID-SEC-2024-0114,WID-SEC-2024-0064,WID-SEC-2023-2229,WID-SEC-2023-2031,WID-SEC-2023-1886,WID-SEC-2023-1812,WID-SEC-2023-1793,WID-SEC-2023-1790,WID-SEC-2023-1614,WID-SEC-2023-1553,WID-SEC-2023-1432,WID-SEC-2023-1424,WID-SEC-2023-1350,WID-SEC-2023-1033,WID-SEC-2023-1016,WID-SEC-2023-0777,WID-SEC-2023-0304,WID-SEC-2022-2375",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.33 / 8.0 <= 8.0.23 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.34
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145796,"CVE-2021-3449,CVE-2021-3450,CVE-2021-23840,CVE-2021-23841,CVE-2021-2307,CVE-2021-2304,CVE-2021-2180,CVE-2021-2194,CVE-2021-2166,CVE-2021-2179,CVE-2021-2226,CVE-2021-2169,CVE-2021-2146,CVE-2021-2174,CVE-2021-2171,CVE-2021-2162",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a4356c35-b4d3-401e-9456-9436982cfd3d,"","Update to version 5.7.34, 8.0.24 or later.","Oracle MySQL Server version 5.7.33 and prior and 8.0 through 8.0.23.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.33 / 8.0 <= 8.0.23 Security Update (cpuapr2021) -...
(OID: 1.3.6.1.4.1.25623.1.0.145796)
Version used: 2023-10-21T00:09:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-1582,DFN-CERT-2022-1571,DFN-CERT-2022-1241,DFN-CERT-2022-1215,DFN-CERT-2022-0933,DFN-CERT-2022-0666,DFN-CERT-2022-0121,DFN-CERT-2022-0076,DFN-CERT-2022-0024,DFN-CERT-2021-2527,DFN-CERT-2021-2394,DFN-CERT-2021-2223,DFN-CERT-2021-2216,DFN-CERT-2021-2214,DFN-CERT-2021-2197,DFN-CERT-2021-2196,DFN-CERT-2021-2190,DFN-CERT-2021-2155,DFN-CERT-2021-2126,DFN-CERT-2021-1996,DFN-CERT-2021-1825,DFN-CERT-2021-1803,DFN-CERT-2021-1740,DFN-CERT-2021-1670,DFN-CERT-2021-1660,DFN-CERT-2021-1549,DFN-CERT-2021-1547,DFN-CERT-2021-1537,DFN-CERT-2021-1500,DFN-CERT-2021-1418,DFN-CERT-2021-1330,DFN-CERT-2021-1132,DFN-CERT-2021-1129,DFN-CERT-2021-1128,DFN-CERT-2021-1098,DFN-CERT-2021-1070,DFN-CERT-2021-1061,DFN-CERT-2021-0984,DFN-CERT-2021-0884,DFN-CERT-2021-0862,DFN-CERT-2021-0829,DFN-CERT-2021-0821,DFN-CERT-2021-0818,DFN-CERT-2021-0813,DFN-CERT-2021-0807,DFN-CERT-2021-0806,DFN-CERT-2021-0740,DFN-CERT-2021-0696,DFN-CERT-2021-0656,DFN-CERT-2021-0630,DFN-CERT-2021-0629,DFN-CERT-2021-0409,DFN-CERT-2021-0408,DFN-CERT-2021-0379,DFN-CERT-2021-0363,WID-SEC-2024-0794,WID-SEC-2023-0065,WID-SEC-2022-1894,WID-SEC-2022-1320,WID-SEC-2022-1303,WID-SEC-2022-1294,WID-SEC-2022-0751,WID-SEC-2022-0676,WID-SEC-2022-0671,WID-SEC-2022-0669,WID-SEC-2022-0602,CB-K22/0476,CB-K22/0061,CB-K21/1097,CB-K21/1095,CB-K21/1065,CB-K21/0785,CB-K21/0770,CB-K21/0573,CB-K21/0572,CB-K21/0565,CB-K21/0421,CB-K21/0412,CB-K21/0409,CB-K21/0389,CB-K21/0317,CB-K21/0185",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.5.39 / 5.6 <= 5.6.20 Security Update (cpuoct2014) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.21
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.804781,"CVE-2014-6507,CVE-2014-6491,CVE-2014-6500,CVE-2014-6469,CVE-2014-6555,CVE-2014-6559,CVE-2014-6494,CVE-2014-6496,CVE-2014-6464",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b73747b5-9b96-46ed-9ad4-e461aa3cede8,"Successful exploitation will allow attackers to disclose potentially
sensitive information, gain escalated privileges, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system.","Update to version 5.5.40, 5.6.21 or later.","Oracle MySQL Server versions 5.5.39 and prior and 5.6 through 5.6.20.","Unspecified errors in the MySQL Server component via unknown vectors
related to C API SSL CERTIFICATE HANDLING, SERVER:DML, SERVER:SSL:yaSSL, SERVER:OPTIMIZER,
SERVER:INNODB DML FOREIGN KEYS.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.39 / 5.6 <= 5.6.20 Security Update (cpuoct2014) -...
(OID: 1.3.6.1.4.1.25623.1.0.804781)
Version used: 2022-04-14T19:24:11+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1604,DFN-CERT-2015-1016,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2014-1567,DFN-CERT-2014-1500,DFN-CERT-2014-1357,CB-K15/1518,CB-K15/0964,CB-K15/0567,CB-K15/0415,CB-K14/1482,CB-K14/1420,CB-K14/1299",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.808590,"CVE-2016-3486,CVE-2016-3501,CVE-2016-3614,CVE-2016-3459,CVE-2016-5439,CVE-2016-2105,CVE-2016-2106",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6ab9416e-bb7f-4e14-9717-001dd210d2b6,"Successful exploitation will allow remote attacker to affect
availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.30 and 5.7 through 5.7.12.","Multiple unspecified errors exist in the 'MySQL Server' component
via unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpujul201...
(OID: 1.3.6.1.4.1.25623.1.0.808590)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2017-1972,DFN-CERT-2017-1785,DFN-CERT-2017-0947,DFN-CERT-2017-0675,DFN-CERT-2016-2081,DFN-CERT-2016-1859,DFN-CERT-2016-1722,DFN-CERT-2016-1715,DFN-CERT-2016-1692,DFN-CERT-2016-1401,DFN-CERT-2016-1372,DFN-CERT-2016-1175,DFN-CERT-2016-1174,DFN-CERT-2016-1169,DFN-CERT-2016-1160,DFN-CERT-2016-1103,DFN-CERT-2016-1026,DFN-CERT-2016-0951,DFN-CERT-2016-0815,DFN-CERT-2016-0765,DFN-CERT-2016-0740,DFN-CERT-2016-0702,WID-SEC-2024-0215,CB-K17/1892,CB-K17/1709,CB-K17/0917,CB-K17/0657,CB-K16/1972,CB-K16/1755,CB-K16/1625,CB-K16/1622,CB-K16/1593,CB-K16/1315,CB-K16/1289,CB-K16/1107,CB-K16/1103,CB-K16/1100,CB-K16/1090,CB-K16/1038,CB-K16/0955,CB-K16/0894,CB-K16/0763,CB-K16/0716,CB-K16/0700,CB-K16/0652",""
192.168.8.111,,443,tcp,7.5,High,98,"Mitigation","SSL/TLS: Report Vulnerable Cipher Suites for HTTPS","This routine reports all SSL/TLS cipher suites accepted by a service
where attack vectors exists only on HTTPS services.","'Vulnerable' cipher suites accepted by this service via the TLSv1.0 protocol:

TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)

'Vulnerable' cipher suites accepted by this service via the TLSv1.1 protocol:

TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)


",1.3.6.1.4.1.25623.1.0.108031,"CVE-2016-2183,CVE-2016-6329,CVE-2020-12872",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,de05aacc-6fc3-473a-8f6c-843aa026a761,"","The configuration of this services should be changed so
that it does not accept the listed cipher suites anymore.

Please see the references for more resources supporting you with this task.","Services accepting vulnerable SSL/TLS cipher suites via HTTPS.","These rules are applied for the evaluation of the vulnerable cipher suites:

- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).","
Details:
SSL/TLS: Report Vulnerable Cipher Suites for HTTPS
(OID: 1.3.6.1.4.1.25623.1.0.108031)
Version used: 2023-07-20T13:05:17+08:00
","","","DFN-CERT-2021-1618,DFN-CERT-2021-0775,DFN-CERT-2021-0770,DFN-CERT-2021-0274,DFN-CERT-2020-2141,DFN-CERT-2020-0368,DFN-CERT-2019-1455,DFN-CERT-2019-0068,DFN-CERT-2018-1296,DFN-CERT-2018-0323,DFN-CERT-2017-2070,DFN-CERT-2017-1954,DFN-CERT-2017-1885,DFN-CERT-2017-1831,DFN-CERT-2017-1821,DFN-CERT-2017-1785,DFN-CERT-2017-1626,DFN-CERT-2017-1326,DFN-CERT-2017-1239,DFN-CERT-2017-1238,DFN-CERT-2017-1090,DFN-CERT-2017-1060,DFN-CERT-2017-0968,DFN-CERT-2017-0947,DFN-CERT-2017-0946,DFN-CERT-2017-0904,DFN-CERT-2017-0816,DFN-CERT-2017-0746,DFN-CERT-2017-0677,DFN-CERT-2017-0675,DFN-CERT-2017-0611,DFN-CERT-2017-0609,DFN-CERT-2017-0522,DFN-CERT-2017-0519,DFN-CERT-2017-0482,DFN-CERT-2017-0351,DFN-CERT-2017-0090,DFN-CERT-2017-0089,DFN-CERT-2017-0088,DFN-CERT-2017-0086,DFN-CERT-2016-1943,DFN-CERT-2016-1937,DFN-CERT-2016-1732,DFN-CERT-2016-1726,DFN-CERT-2016-1715,DFN-CERT-2016-1714,DFN-CERT-2016-1588,DFN-CERT-2016-1555,DFN-CERT-2016-1391,DFN-CERT-2016-1378,WID-SEC-2024-1277,WID-SEC-2024-0209,WID-SEC-2024-0064,WID-SEC-2022-2226,WID-SEC-2022-1955,CB-K21/1094,CB-K20/1023,CB-K20/0321,CB-K20/0314,CB-K20/0157,CB-K19/0618,CB-K19/0615,CB-K18/0296,CB-K17/1980,CB-K17/1871,CB-K17/1803,CB-K17/1753,CB-K17/1750,CB-K17/1709,CB-K17/1558,CB-K17/1273,CB-K17/1202,CB-K17/1196,CB-K17/1055,CB-K17/1026,CB-K17/0939,CB-K17/0917,CB-K17/0915,CB-K17/0877,CB-K17/0796,CB-K17/0724,CB-K17/0661,CB-K17/0657,CB-K17/0582,CB-K17/0581,CB-K17/0506,CB-K17/0504,CB-K17/0467,CB-K17/0345,CB-K17/0098,CB-K17/0089,CB-K17/0086,CB-K17/0082,CB-K16/1837,CB-K16/1830,CB-K16/1635,CB-K16/1630,CB-K16/1624,CB-K16/1622,CB-K16/1500,CB-K16/1465,CB-K16/1307,CB-K16/1296",""
192.168.8.111,,8445,tcp,7.5,High,98,"Mitigation","SSL/TLS: Report Vulnerable Cipher Suites for HTTPS","This routine reports all SSL/TLS cipher suites accepted by a service
where attack vectors exists only on HTTPS services.","'Vulnerable' cipher suites accepted by this service via the TLSv1.0 protocol:

TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)

'Vulnerable' cipher suites accepted by this service via the TLSv1.1 protocol:

TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)


",1.3.6.1.4.1.25623.1.0.108031,"CVE-2016-2183,CVE-2016-6329,CVE-2020-12872",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1276c9b3-86bc-4592-9738-03ce30fd4d4f,"","The configuration of this services should be changed so
that it does not accept the listed cipher suites anymore.

Please see the references for more resources supporting you with this task.","Services accepting vulnerable SSL/TLS cipher suites via HTTPS.","These rules are applied for the evaluation of the vulnerable cipher suites:

- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).","
Details:
SSL/TLS: Report Vulnerable Cipher Suites for HTTPS
(OID: 1.3.6.1.4.1.25623.1.0.108031)
Version used: 2023-07-20T13:05:17+08:00
","","","DFN-CERT-2021-1618,DFN-CERT-2021-0775,DFN-CERT-2021-0770,DFN-CERT-2021-0274,DFN-CERT-2020-2141,DFN-CERT-2020-0368,DFN-CERT-2019-1455,DFN-CERT-2019-0068,DFN-CERT-2018-1296,DFN-CERT-2018-0323,DFN-CERT-2017-2070,DFN-CERT-2017-1954,DFN-CERT-2017-1885,DFN-CERT-2017-1831,DFN-CERT-2017-1821,DFN-CERT-2017-1785,DFN-CERT-2017-1626,DFN-CERT-2017-1326,DFN-CERT-2017-1239,DFN-CERT-2017-1238,DFN-CERT-2017-1090,DFN-CERT-2017-1060,DFN-CERT-2017-0968,DFN-CERT-2017-0947,DFN-CERT-2017-0946,DFN-CERT-2017-0904,DFN-CERT-2017-0816,DFN-CERT-2017-0746,DFN-CERT-2017-0677,DFN-CERT-2017-0675,DFN-CERT-2017-0611,DFN-CERT-2017-0609,DFN-CERT-2017-0522,DFN-CERT-2017-0519,DFN-CERT-2017-0482,DFN-CERT-2017-0351,DFN-CERT-2017-0090,DFN-CERT-2017-0089,DFN-CERT-2017-0088,DFN-CERT-2017-0086,DFN-CERT-2016-1943,DFN-CERT-2016-1937,DFN-CERT-2016-1732,DFN-CERT-2016-1726,DFN-CERT-2016-1715,DFN-CERT-2016-1714,DFN-CERT-2016-1588,DFN-CERT-2016-1555,DFN-CERT-2016-1391,DFN-CERT-2016-1378,WID-SEC-2024-1277,WID-SEC-2024-0209,WID-SEC-2024-0064,WID-SEC-2022-2226,WID-SEC-2022-1955,CB-K21/1094,CB-K20/1023,CB-K20/0321,CB-K20/0314,CB-K20/0157,CB-K19/0618,CB-K19/0615,CB-K18/0296,CB-K17/1980,CB-K17/1871,CB-K17/1803,CB-K17/1753,CB-K17/1750,CB-K17/1709,CB-K17/1558,CB-K17/1273,CB-K17/1202,CB-K17/1196,CB-K17/1055,CB-K17/1026,CB-K17/0939,CB-K17/0917,CB-K17/0915,CB-K17/0877,CB-K17/0796,CB-K17/0724,CB-K17/0661,CB-K17/0657,CB-K17/0582,CB-K17/0581,CB-K17/0506,CB-K17/0504,CB-K17/0467,CB-K17/0345,CB-K17/0098,CB-K17/0089,CB-K17/0086,CB-K17/0082,CB-K16/1837,CB-K16/1830,CB-K16/1635,CB-K16/1630,CB-K16/1624,CB-K16/1622,CB-K16/1500,CB-K16/1465,CB-K16/1307,CB-K16/1296",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.6.48 Security Update (cpujul2020) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.49
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.144286,"CVE-2020-1967,CVE-2020-14539,CVE-2020-14559",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ecc680d2-7078-4b44-84e5-d7d164ddcde7,"","Update to version 5.6.49 or later.","Oracle MySQL Server versions 5.6.48 and prior.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.48 Security Update (cpujul2020) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.144286)
Version used: 2021-08-16T20:00:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-2192,DFN-CERT-2021-0830,DFN-CERT-2021-0826,DFN-CERT-2021-0444,DFN-CERT-2021-0140,DFN-CERT-2020-2295,DFN-CERT-2020-2286,DFN-CERT-2020-2006,DFN-CERT-2020-1827,DFN-CERT-2020-1788,DFN-CERT-2020-1508,DFN-CERT-2020-0956,DFN-CERT-2020-0930,DFN-CERT-2020-0841,DFN-CERT-2020-0824,DFN-CERT-2020-0822,WID-SEC-2024-0794,WID-SEC-2023-3080,CB-K21/1088,CB-K21/0070,CB-K20/1023,CB-K20/1017,CB-K20/0711,CB-K20/0708,CB-K20/0357",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.37 / 8.0 <= 8.0.28 Security Update (cpuapr2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.38
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.113944,"CVE-2022-0778,CVE-2022-21454,CVE-2022-21417,CVE-2022-21427,CVE-2022-21451,CVE-2022-21444,CVE-2022-21460",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,857989d3-c597-44d3-9a29-a7186af328a8,"","Update to version 5.7.38, 8.0.29 or later.","Oracle MySQL Server version 5.7.37 and prior and 8.0 through
8.0.28.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.37 / 8.0 <= 8.0.28 Security Update (cpuapr2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.113944)
Version used: 2022-04-25T22:30:15+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0147,DFN-CERT-2023-2667,DFN-CERT-2023-0081,DFN-CERT-2022-2668,DFN-CERT-2022-2376,DFN-CERT-2022-2268,DFN-CERT-2022-2111,DFN-CERT-2022-2094,DFN-CERT-2022-2059,DFN-CERT-2022-2047,DFN-CERT-2022-1928,DFN-CERT-2022-1837,DFN-CERT-2022-1667,DFN-CERT-2022-1597,DFN-CERT-2022-1469,DFN-CERT-2022-1370,DFN-CERT-2022-1294,DFN-CERT-2022-1264,DFN-CERT-2022-1205,DFN-CERT-2022-1116,DFN-CERT-2022-1115,DFN-CERT-2022-1114,DFN-CERT-2022-1081,DFN-CERT-2022-0955,DFN-CERT-2022-0902,DFN-CERT-2022-0899,DFN-CERT-2022-0898,DFN-CERT-2022-0873,DFN-CERT-2022-0866,DFN-CERT-2022-0865,DFN-CERT-2022-0779,DFN-CERT-2022-0759,DFN-CERT-2022-0627,DFN-CERT-2022-0625,DFN-CERT-2022-0610,DFN-CERT-2022-0603,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2023-1969,WID-SEC-2022-1335,WID-SEC-2022-1228,WID-SEC-2022-1081,WID-SEC-2022-1057,WID-SEC-2022-0836,WID-SEC-2022-0833,WID-SEC-2022-0826,WID-SEC-2022-0767,WID-SEC-2022-0677,WID-SEC-2022-0551,WID-SEC-2022-0530,WID-SEC-2022-0515,WID-SEC-2022-0432,WID-SEC-2022-0393,WID-SEC-2022-0302,WID-SEC-2022-0270,WID-SEC-2022-0261,WID-SEC-2022-0200,WID-SEC-2022-0190,WID-SEC-2022-0169,WID-SEC-2022-0065,CB-K22/0619,CB-K22/0470,CB-K22/0468,CB-K22/0321",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpujan2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.37
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.147465,"CVE-2021-22946,CVE-2022-21367,CVE-2022-21270,CVE-2022-21304,CVE-2022-21344,CVE-2022-21303,CVE-2022-21245,CVE-2021-22947",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ae3702db-4687-416a-b44d-4131ab36ff9e,"","Update to version 5.7.37, 8.0.28 or later.","Oracle MySQL Server version 5.7.36 and prior and 8.0 through
8.0.27.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpujan2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.147465)
Version used: 2023-10-19T13:05:21+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-2376,DFN-CERT-2022-2086,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-2047,DFN-CERT-2022-1892,DFN-CERT-2022-1692,DFN-CERT-2022-1571,DFN-CERT-2022-1143,DFN-CERT-2022-0835,DFN-CERT-2022-0586,DFN-CERT-2022-0118,DFN-CERT-2022-0112,DFN-CERT-2022-0052,DFN-CERT-2021-2527,DFN-CERT-2021-1931,WID-SEC-2023-2229,WID-SEC-2023-1350,WID-SEC-2022-1908,WID-SEC-2022-1461,WID-SEC-2022-1335,WID-SEC-2022-1228,WID-SEC-2022-1056,WID-SEC-2022-0875,WID-SEC-2022-0751,WID-SEC-2022-0676,WID-SEC-2022-0393,WID-SEC-2022-0101,CB-K22/0316,CB-K22/0077,CB-K22/0062,CB-K22/0030,CB-K21/0991,CB-K21/0969",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 03 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811989,"CVE-2017-3731",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c3b57d99-a13a-4ce4-8370-55cf7a421f56,"Successful exploitation of this vulnerability
will allow remote attackers to compromise availability of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version
5.6.35 and earlier, 5.7.18 and earlier on Windows.","The flaw exists due to an error in
'Server: Security: Encryption (OpenSSL)'","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (oct2017-3236626) 03 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811989)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1377,DFN-CERT-2018-0323,DFN-CERT-2018-0011,DFN-CERT-2017-1972,DFN-CERT-2017-1831,DFN-CERT-2017-1830,DFN-CERT-2017-1828,DFN-CERT-2017-1827,DFN-CERT-2017-1807,DFN-CERT-2017-1785,DFN-CERT-2017-1244,DFN-CERT-2017-1243,DFN-CERT-2017-1236,DFN-CERT-2017-0746,DFN-CERT-2017-0675,DFN-CERT-2017-0673,DFN-CERT-2017-0608,DFN-CERT-2017-0314,DFN-CERT-2017-0313,DFN-CERT-2017-0307,DFN-CERT-2017-0301,DFN-CERT-2017-0272,DFN-CERT-2017-0219,DFN-CERT-2017-0178,DFN-CERT-2017-0162,DFN-CERT-2017-0156,WID-SEC-2022-1914,WID-SEC-2022-0673,CB-K22/0045,CB-K18/0296,CB-K18/0006,CB-K17/1892,CB-K17/1753,CB-K17/1749,CB-K17/1748,CB-K17/1747,CB-K17/1725,CB-K17/1709,CB-K17/1205,CB-K17/1204,CB-K17/1198,CB-K17/0724,CB-K17/0659,CB-K17/0657,CB-K17/0583,CB-K17/0308,CB-K17/0307,CB-K17/0302,CB-K17/0289,CB-K17/0267,CB-K17/0214,CB-K17/0175,CB-K17/0158,CB-K17/0153",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-01 (Feb 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805132,"CVE-2015-0411,CVE-2014-6568,CVE-2015-0382,CVE-2015-0381,CVE-2015-0374",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,eaa37b55-efd3-4bfd-b4d3-2cfc1c331aa0,"Successful exploitation will allow attackers
to disclose potentially sensitive information, manipulate certain data,
cause a DoS (Denial of Service), and compromise a vulnerable system.","Apply the patch from the referenced advisory.","Oracle MySQL Server version 5.5.40 and earlier,
and 5.6.21 and earlier on Windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to Server:- Security:Encryption,
InnoDB:DML, Replication, and Security:Privileges:Foreign Key.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-01 (Feb 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805132)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1264,DFN-CERT-2015-1016,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2015-0074,CB-K15/1193,CB-K15/0964,CB-K15/0567,CB-K15/0415,CB-K15/0073",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 05 - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811993,"CVE-2017-10283,CVE-2017-10294,CVE-2017-10286,CVE-2017-10155,CVE-2017-10314,CVE-2017-10276,CVE-2017-10227",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,2687315b-2bcf-45cc-a946-573e84e708ca,"Successful exploitation of this
vulnerability will allow remote attackers to compromise availability
integrity and confidentiality of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version
5.6.37 and earlier, 5.7.19 and earlier on Windows","Multiple flaws exist due to:

- An error in 'Server: Performance Schema' component.

- An error in 'Server: Optimizer' component.

- An error in 'Server: InnoDB' component.

- An error in 'Server: Pluggable Auth' component.

- An error in 'Server: Memcached' component.

- An error in 'Server: FTS' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (oct2017-3236626) 05 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811993)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K18/0224,CB-K17/2048,CB-K17/1748",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.30 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.42
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149534,"CVE-2023-21912",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c4c3c6a8-1482-4e5f-b9eb-3aeb261daf1c,"","Update to version 5.7.42, 8.0.31 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
8.0.30.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.30 Security Update (cpuapr2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149534)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-1058,DFN-CERT-2023-1037,DFN-CERT-2023-0885,WID-SEC-2023-2031,WID-SEC-2023-1033",""
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 06 - Windows","Oracle MySQL is prone to multiple denial of service (DoS) vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.810890,"CVE-2017-3450,CVE-2017-3599",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,49cd612c-f927-4b11-a05b-89b1dd744155,"Successful exploitation of this vulnerability
will allow remote attackers to conduct a denial-of-service condition.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.35 and earlier,
5.7.17 and earlier on Windows","Multiple flaws exist due to unspecified
errors in the 'Server: Memcached', 'Server: Pluggable Auth' components of the
application.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2017-3236618) 06 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.810890)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-0675,CB-K17/1732,CB-K17/1604,CB-K17/0657",""
192.168.8.77,,3306,tcp,7.4,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.20
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.804780,"CVE-2014-0224,CVE-2014-6489,CVE-2014-6564,CVE-2014-6474,CVE-2010-5298,CVE-2014-0195,CVE-2014-0198,CVE-2014-0221,CVE-2014-3470",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f7565430-435b-4067-bd5c-0bd7ec8a71b5,"Successful exploitation will allow attackers to disclose potentially
sensitive information, gain escalated privileges, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system.","Update to version 5.6.20 or later.","Oracle MySQL Server versions 5.6 through 5.6.19.","Unspecified errors in the MySQL Server component via unknown vectors
related to SERVER:INNODB FULLTEXT SEARCH DML, SERVER:SP, and SERVER:MEMCACHED.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804780)
Version used: 2023-11-02T13:05:26+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0388,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2015-0396,DFN-CERT-2015-0082,DFN-CERT-2015-0079,DFN-CERT-2015-0078,DFN-CERT-2014-1717,DFN-CERT-2014-1632,DFN-CERT-2014-1567,DFN-CERT-2014-1364,DFN-CERT-2014-1357,DFN-CERT-2014-1350,DFN-CERT-2014-1265,DFN-CERT-2014-1209,DFN-CERT-2014-1094,DFN-CERT-2014-1061,DFN-CERT-2014-1017,DFN-CERT-2014-0917,DFN-CERT-2014-0809,DFN-CERT-2014-0793,DFN-CERT-2014-0789,DFN-CERT-2014-0778,DFN-CERT-2014-0768,DFN-CERT-2014-0752,DFN-CERT-2014-0747,DFN-CERT-2014-0738,DFN-CERT-2014-0715,DFN-CERT-2014-0714,DFN-CERT-2014-0709,DFN-CERT-2014-0585,DFN-CERT-2014-0548,DFN-CERT-2014-0526,DFN-CERT-2014-0482,WID-SEC-2023-0502,WID-SEC-2023-0501,WID-SEC-2023-0500,CB-K15/0567,CB-K15/0415,CB-K15/0384,CB-K15/0080,CB-K15/0079,CB-K15/0074,CB-K14/1617,CB-K14/1537,CB-K14/1482,CB-K14/1299,CB-K14/1297,CB-K14/1294,CB-K14/1202,CB-K14/1174,CB-K14/1153,CB-K14/1050,CB-K14/1016,CB-K14/0968,CB-K14/0876,CB-K14/0772,CB-K14/0762,CB-K14/0756,CB-K14/0746,CB-K14/0736,CB-K14/0722,CB-K14/0716,CB-K14/0708,CB-K14/0684,CB-K14/0683,CB-K14/0680,CB-K14/0560,CB-K14/0526,CB-K14/0509,CB-K14/0459",""
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.806876,"CVE-2016-0608,CVE-2016-0609,CVE-2016-0606,CVE-2016-0600,CVE-2016-0598,CVE-2016-0597,CVE-2016-0546,CVE-2016-0505",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,42376285-83a9-4021-ad7e-6b980e525ec4,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.46 and prior, 5.6 through 5.6.27 and version 5.7.9.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 / 5.7.9 Security Update (cpuja...
(OID: 1.3.6.1.4.1.25623.1.0.806876)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0143,DFN-CERT-2016-0104,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0646,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K16/0133,CB-K16/0094",""
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-02 (Sep 2016) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.33

",1.3.6.1.4.1.25623.1.0.808699,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,885d2858-1b38-4cee-a4df-ffbd19cb80a4,"Successful exploitation will allow an
remote attacker to gain elevated privileges on the affected system, also
could allow buffer overflow attacks.","Upgrade to Oracle MySQL Server 5.6.33 or later.","Oracle MySQL Server 5.6.x to 5.6.32
on windows","Multiple errors exist. Please see the references for more information.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Unspecified Vulnerability-02 (Sep 2016) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.808699)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","",""
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-06 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805769,"CVE-2015-4879,CVE-2015-4819",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8d7fbb92-fcc1-43b5-badf-ac6e50506685,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality, integrity, and
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server Server 5.5.44 and
earlier, and 5.6.25 and earlier","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-06 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805769)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-0845,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1692,DFN-CERT-2015-1638,CB-K16/1122,CB-K16/0791,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K15/1844,CB-K15/1600,CB-K15/1554",""
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Server <= 5.7.29 / 8.0 <= 8.0.19 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to a vulnerability in the parser.","Installed version: 5.6.10
Fixed version: 5.7.30
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145800,"CVE-2021-2144",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,355024e4-64c9-4bb7-b8a5-47f48e98d309,"","Update to version 5.7.30, 8.0.20 or later.","Oracle MySQL Server version 5.7.29 and prior and 8.0 through 8.0.19.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.29 / 8.0 <= 8.0.19 Security Update (cpuapr2021) -...
(OID: 1.3.6.1.4.1.25623.1.0.145800)
Version used: 2021-08-26T21:01:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-0821,WID-SEC-2023-0065,CB-K21/0421",""
192.168.8.77,,3306,tcp,7.1,High,80,"VendorFix","Oracle MySQL Security Update (cpujul2018 - 05) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See reference
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.813712,"CVE-2018-0739,CVE-2018-3064,CVE-2018-3062,CVE-2017-3737,CVE-2017-3738",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,83273840-df0b-4fb9-bfe6-5db92130df9b,"Successful exploitation will allow remote
attackers to have an impact on integrity and availability.","The vendor has released updates. Please see the references for
more information.","Oracle MySQL version 5.6.40 and prior,
5.7.22 and prior, 8.0.11 and prior.","Multiple flaws exist due to multiple errors
in 'InnoDB', 'Server: Installing (OpenSSL)' and 'Server: Memcached' components
of MySQL Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Security Update (cpujul2018 - 05) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.813712)
Version used: 2022-07-20T18:33:02+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-1541,DFN-CERT-2020-0403,DFN-CERT-2019-1996,DFN-CERT-2019-1722,DFN-CERT-2019-1588,DFN-CERT-2019-1398,DFN-CERT-2019-1285,DFN-CERT-2019-1152,DFN-CERT-2019-1108,DFN-CERT-2019-1047,DFN-CERT-2019-0484,DFN-CERT-2019-0351,DFN-CERT-2019-0112,DFN-CERT-2018-2210,DFN-CERT-2018-2113,DFN-CERT-2018-2109,DFN-CERT-2018-2103,DFN-CERT-2018-1931,DFN-CERT-2018-1832,DFN-CERT-2018-1726,DFN-CERT-2018-1649,DFN-CERT-2018-1411,DFN-CERT-2018-1408,DFN-CERT-2018-1407,DFN-CERT-2018-1402,DFN-CERT-2018-1377,DFN-CERT-2018-1364,DFN-CERT-2018-1326,DFN-CERT-2018-1068,DFN-CERT-2018-0985,DFN-CERT-2018-0816,DFN-CERT-2018-0759,DFN-CERT-2018-0736,DFN-CERT-2018-0729,DFN-CERT-2018-0725,DFN-CERT-2018-0723,DFN-CERT-2018-0696,DFN-CERT-2018-0673,DFN-CERT-2018-0655,DFN-CERT-2018-0584,DFN-CERT-2018-0536,DFN-CERT-2018-0318,DFN-CERT-2018-0223,DFN-CERT-2018-0212,DFN-CERT-2018-0101,DFN-CERT-2018-0064,DFN-CERT-2017-2237,DFN-CERT-2017-2216,WID-SEC-2024-0205,WID-SEC-2023-2048,WID-SEC-2023-1969,WID-SEC-2023-1594,WID-SEC-2022-0673,CB-K22/0045,CB-K21/0782,CB-K19/0045,CB-K18/1075,CB-K18/1012,CB-K18/1009,CB-K18/1006,CB-K18/1004,CB-K18/0813,CB-K18/0808,CB-K18/0800,CB-K18/0799,CB-K18/0795,CB-K18/0794,CB-K18/0791,CB-K18/0790,CB-K18/0636,CB-K18/0608,CB-K18/0607,CB-K18/0606,CB-K18/0605,CB-K18/0545,CB-K18/0495,CB-K18/0301,CB-K18/0205,CB-K18/0195,CB-K18/0096,CB-K18/0057,CB-K17/2139,CB-K17/2122",""
192.168.8.77,,3306,tcp,7.1,High,80,"VendorFix","Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Update (cpujan2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.112489,"CVE-2019-2534,CVE-2019-2529,CVE-2019-2482,CVE-2019-2455,CVE-2019-2503,CVE-2018-0734,CVE-2019-2537,CVE-2019-2481,CVE-2019-2507,CVE-2019-2531,CVE-2018-5407",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,18c87cae-ea65-498f-b4b4-789b8dc7787e,"Successful exploitation of this vulnerability can result in unauthorized
access to critical data or complete access to all MySQL Server accessible data and unauthorized ability
to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.","Updates are available. Apply the necessary patch from the referenced link.","Oracle MySQL Server versions 5.6.42 and prior, 5.7 through 5.7.24 and 8.0 through 8.0.13.","The attacks range in variety and difficulty. Most of them allow an attacker
with network access via multiple protocols to compromise the MySQL Server.

For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.112489)
Version used: 2023-02-02T18:09:00+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-0326,DFN-CERT-2019-2457,DFN-CERT-2019-2456,DFN-CERT-2019-2305,DFN-CERT-2019-2300,DFN-CERT-2019-2046,DFN-CERT-2019-1996,DFN-CERT-2019-1897,DFN-CERT-2019-1746,DFN-CERT-2019-1713,DFN-CERT-2019-1617,DFN-CERT-2019-1614,DFN-CERT-2019-1600,DFN-CERT-2019-1588,DFN-CERT-2019-1562,DFN-CERT-2019-1455,DFN-CERT-2019-1450,DFN-CERT-2019-1240,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0782,DFN-CERT-2019-0781,DFN-CERT-2019-0778,DFN-CERT-2019-0775,DFN-CERT-2019-0772,DFN-CERT-2019-0484,DFN-CERT-2019-0232,DFN-CERT-2019-0204,DFN-CERT-2019-0112,DFN-CERT-2019-0104,DFN-CERT-2019-0103,DFN-CERT-2019-0102,DFN-CERT-2018-2541,DFN-CERT-2018-2539,DFN-CERT-2018-2513,DFN-CERT-2018-2456,DFN-CERT-2018-2444,DFN-CERT-2018-2396,DFN-CERT-2018-2360,DFN-CERT-2018-2338,DFN-CERT-2018-2214,WID-SEC-2023-3083,WID-SEC-2023-1594,WID-SEC-2022-1696,WID-SEC-2022-0673,WID-SEC-2022-0517,CB-K22/0045,CB-K20/0324,CB-K20/0136,CB-K19/1121,CB-K19/0696,CB-K19/0622,CB-K19/0615,CB-K19/0321,CB-K19/0320,CB-K19/0319,CB-K19/0318,CB-K19/0316,CB-K19/0314,CB-K19/0050,CB-K19/0044,CB-K18/1173,CB-K18/1065,CB-K18/1039",""
192.168.8.77,,3306,tcp,7.1,High,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 04 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.812650,"CVE-2018-2562",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,85d57b61-c5b1-4938-8c51-52f3b125ef06,"Successful exploitation of this vulnerability
will allow remote attackers to conduct a denial-of-service attack and partially
modify data.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.58 and earlier,
5.6.38 and earlier, 5.7.19 and earlier on Windows","The flaw exists due to an error in
'Server:Partition' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jan2018-3236628) 04 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.812650)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0733,DFN-CERT-2018-0515,DFN-CERT-2018-0424,DFN-CERT-2018-0286,DFN-CERT-2018-0101,CB-K18/0480,CB-K18/0392,CB-K18/0265,CB-K18/0096",""
192.168.8.77,,3306,tcp,7.0,High,80,"VendorFix","Oracle MySQL Server <= 5.5.51 / 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809372,"CVE-2016-3492,CVE-2016-5626,CVE-2016-5629,CVE-2016-5616,CVE-2016-5617,CVE-2016-8283,CVE-2016-6663,CVE-2016-6664",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6a2c94bc-3493-49ac-903e-1e055166947c,"Successful exploitation of these vulnerabilities will allow remote
authenticated attackers to cause denial of service conditions and gain elevated privileges.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.51 and prior, 5.6 through 5.6.32 and 5.7 through 5.7.14.","Multiple flaws exist due to multiple unspecified errors in the
'Server:GIS', 'Server:Federated', 'Server:Optimizer', 'Server:Types', 'Server:Error Handling' and
'Server:MyISAM' components.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.51 / 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.809372)
Version used: 2021-10-13T19:01:26+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-1473,DFN-CERT-2018-0242,DFN-CERT-2017-1341,DFN-CERT-2017-0138,DFN-CERT-2016-2089,DFN-CERT-2016-1950,DFN-CERT-2016-1859,DFN-CERT-2016-1790,DFN-CERT-2016-1714,CB-K18/0224,CB-K17/1298,CB-K17/0139,CB-K16/1979,CB-K16/1846,CB-K16/1755,CB-K16/1714,CB-K16/1624",""
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.806879,"CVE-2016-0611,CVE-2016-0607,CVE-2016-0504,CVE-2016-0503",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f7233b70-a761-47bd-bfe6-a6e2dbfde8ab,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.27 and version 5.7.9.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) - Win...
(OID: 1.3.6.1.4.1.25623.1.0.806879)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0695,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0646,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 01 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Vulnerable range: 5.6 - 5.6.14

",1.3.6.1.4.1.25623.1.0.804072,"CVE-2013-5860,CVE-2013-5881,CVE-2014-0431",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6c2c6775-fa1d-4f99-ab7f-d0f781511b91,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.14 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to GIS and InnoDB.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 01 (Jan 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804072)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0055",""
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2017-2881727) 03 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.809867,"CVE-2016-8318,CVE-2016-8327,CVE-2017-3273,CVE-2017-3257",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,301bfc68-33e4-4e85-bc45-de15f2887bcd,"Successful exploitation of these
vulnerabilities will allow remote to have an impact on availability,
confidentiality and integrity.","Apply the patch from the referenced advisory.","Oracle MySQL version
5.6.34 and earlier, 5.7.16 and earlier, on Windows","Multiple flaws exist due to: multiple
unspecified errors in sub components 'Security: Encryption', 'DDL',
'InnoDB' and 'Replication'.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jan2017-2881727) 03 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.809867)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-0090,CB-K18/0224,CB-K17/1732,CB-K17/1604,CB-K17/0098",""
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 02 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Vulnerable range: 5.6 - 5.6.13

",1.3.6.1.4.1.25623.1.0.804073,"CVE-2014-0427,CVE-2014-0430,CVE-2014-0433,CVE-2013-5882,CVE-2013-5894",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,46cb307c-380d-4c03-be12-12b6218c2c74,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.13 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to FTS, Performance Schema, Thread Pooling, Stored Procedures, and InnoDB.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 02 (Jan 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804073)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0055",""
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.11
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117208,"CVE-2013-2395,CVE-2013-2381,CVE-2013-1570,CVE-2013-1567,CVE-2013-1566",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,38618248-ef98-4f41-9c32-3661e43f537b,"Successful exploitation could allow remote attackers to affect
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.6.11 or later.","Oracle MySQL Server versions 5.6 through 5.6.10.","Unspecified error in Data Manipulation Language, Server Privileges,
MemCached and InnoDB.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.117208)
Version used: 2022-04-25T22:50:49+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-0798",""
192.168.8.77,,3306,tcp,6.7,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2017-2881727) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809865,"CVE-2017-3238,CVE-2017-3318,CVE-2017-3291,CVE-2017-3317,CVE-2017-3258,CVE-2017-3312,CVE-2017-3313,CVE-2017-3244,CVE-2017-3265",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fcae09ba-1e94-4d04-ad60-f41fdd4d6dc4,"Successful exploitation of this
vulnerability will allow remote to have an impact on availability,
confidentiality and integrity.","Apply the patch from the referenced advisory.","Oracle MySQL version
5.5.53 and earlier, 5.6.34 and earlier, 5.7.16 and earlier on Windows","Multiple flaws exist due to: multiple
unspecified errors in sub components 'Error Handling', 'Logging', 'MyISAM',
'Packaging', 'Optimizer', 'DML' and 'DDL'.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jan2017-2881727) 02 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.809865)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1341,DFN-CERT-2017-0959,DFN-CERT-2017-0430,DFN-CERT-2017-0090,CB-K18/0224,CB-K17/1732,CB-K17/1604,CB-K17/1298,CB-K17/0927,CB-K17/0423,CB-K17/0098",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2018-3678067) 01 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.813142,"CVE-2018-2805",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e08fffee-9f5a-45f2-8fa7-c6d806255163,"Successful exploitation of this
vulnerability will allow remote attackers to conduct a denial of service
condition.","Apply the latest patch from vendor. Please see the references for more information.","Oracle MySQL version 5.6.39 and earlier
on Windows","The flaw exists due to an error in the
'GIS Extension' of MySQL Server","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2018-3678067) 01 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.813142)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-0723,WID-SEC-2023-1594,CB-K18/0608",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Jul 2015)","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805928,"CVE-2015-4772,CVE-2015-4771,CVE-2015-4769,CVE-2015-4761,CVE-2015-4767,CVE-2015-2641,CVE-2015-2611,CVE-2015-2617,CVE-2015-2639,CVE-2015-2661",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,36268589-71a3-4a4f-a7ca-c1f9f01c91dc,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality, integrity, and
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.24 and earlier on windows.","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server : Partition, Server : Memcached
Server : Security : Firewall, RBR, Server : Optimizer, Server : InnoDB, DML,
Server : I_S, Server : Pluggable Auth, Server : Security : Privileges, GIS,
Partition and Client.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Jul 2015)
(OID: 1.3.6.1.4.1.25623.1.0.805928)
Version used: 2024-02-20T13:05:48+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1071,CB-K15/1020",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 02 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804575,"CVE-2014-2430,CVE-2014-2431,CVE-2014-2436,CVE-2014-2440",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,388a3052-0cb5-48b9-aedf-b52bb1334ed3,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.36 and earlier and 5.6.16 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Performance Schema, Options, RBR.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 02 (May 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804575)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0477,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0464,CB-K14/0452",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 03 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Vulnerable range: 5.6 - 5.6.15

",1.3.6.1.4.1.25623.1.0.804576,"CVE-2014-2434,CVE-2014-2442,CVE-2014-2444,CVE-2014-2450,CVE-2014-2451",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4de4dfe8-8be4-4dca-ab0e-05e5609924ae,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.15 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to DML, MyISAM, InnoDB, Optimizer, and Privileges.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 03 (May 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804576)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0452",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-01 (Jul 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Vulnerable range: 5.6 - 5.6.17

",1.3.6.1.4.1.25623.1.0.804721,"CVE-2014-4238,CVE-2014-4240,CVE-2014-4233,CVE-2014-2484,CVE-2014-4214",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e9ebe825-a323-4598-ba2b-d3135d8b0b00,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.17 and earlier on Windows","Unspecified errors in the MySQL Server component via unknown vectors related
to SROPTZR, SRREP, SRFTS, and SRSP.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-01 (Jul 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804721)
Version used: 2024-02-16T13:06:55+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0911,CB-K14/0868",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-02 (Jul 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804722,"CVE-2014-4258,CVE-2014-4260",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b454eb37-b363-43ee-9235-720f76caf3f9,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.37 and earlier and 5.6.17 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to SRINFOSC and SRCHAR.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-02 (Jul 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804722)
Version used: 2024-02-16T13:06:55+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-0593,DFN-CERT-2014-1500,DFN-CERT-2014-0930,DFN-CERT-2014-0911,CB-K15/0567,CB-K14/1420,CB-K14/0891,CB-K14/0868",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Security Update (cpujul2018 - 02) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See reference
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.813706,"CVE-2018-2767,CVE-2018-3066,CVE-2018-3058,CVE-2018-3070",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,5738f358-0438-4a3b-ba2a-ae48b9077bb2,"Successful exploitation will allow remote
attackers to have an impact on confidentiality, integrity and availability.","The vendor has released updates. Please see the references for
more information.","Oracle MySQL version 5.5.60 and earlier,
5.6.40 and earlier, 5.7.22 and earlier.","Multiple flaws exist due to errors in
'Server: Security: Encryption', 'Server: Options', 'MyISAM', 'Client mysqldump'
components of application.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Security Update (cpujul2018 - 02) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.813706)
Version used: 2023-11-04T00:10:08+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1614,DFN-CERT-2019-1588,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0484,DFN-CERT-2019-0112,DFN-CERT-2018-1649,DFN-CERT-2018-1402,DFN-CERT-2018-1276,DFN-CERT-2018-0913,WID-SEC-2023-1594,CB-K18/0795",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809380,"CVE-2016-5609,CVE-2016-5627,CVE-2016-5630,CVE-2016-8284",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4b33504e-d424-40bb-adec-ab18137c17fc,"Successful exploitation of this vulnerability will allow a remote
authenticated user to cause denial of service conditions.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.31 and 5.7 through 5.7.13.","Multiple flaws exist due to multiple unspecified errors within
the 'Server: DML', 'Server: Replication' and 'Server: InnoDB' components.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update (cpuoct201...
(OID: 1.3.6.1.4.1.25623.1.0.809380)
Version used: 2022-08-08T18:24:51+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1790,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1742,CB-K16/1714,CB-K16/1624",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.1.67 / 5.5 <= 5.5.29 / 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.11
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117206,"CVE-2013-2378,CVE-2013-1506",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,133379ed-7dc3-4d40-b1d1-7712b3b289d3,"Successful exploitation could allow remote attackers to affect
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.1.68, 5.5.30, 5.6.11 or later.","Oracle MySQL Server versions 5.1.67 and prior, 5.5 through 5.5.29 and 5.6 through 5.6.10.","Unspecified error in some unknown vectors related to Information Schema.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.1.67 / 5.5 <= 5.5.29 / 5.6 <= 5.6.10 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.117206)
Version used: 2022-07-21T18:11:30+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-0839,DFN-CERT-2013-0798",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.1.68 / 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.11
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117207,"CVE-2013-2375,CVE-2013-1544,CVE-2013-1532,CVE-2013-2389,CVE-2013-2392,CVE-2013-2391",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,69d455af-1c68-4af6-b70a-e0fb31f339c3,"Successful exploitation could allow remote attackers to affect
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.1.69, 5.5.31, 5.6.11 or later.","Oracle MySQL Server versions 5.1.68 and prior, 5.5 through 5.5.30 and 5.6 through 5.6.10.","Unspecified error in Server Optimizer, Server Privileges, InnoDB, and in
some unspecified vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.1.68 / 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.117207)
Version used: 2022-07-21T18:11:30+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-0882,DFN-CERT-2013-0839,DFN-CERT-2013-0798",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.38 / 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.20
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.804782,"CVE-2014-6530,CVE-2012-5615,CVE-2014-6495,CVE-2014-6478,CVE-2014-4274,CVE-2014-4287,CVE-2014-6484,CVE-2014-6505,CVE-2014-6463,CVE-2014-6551",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,cc88a8bb-b7df-4e56-bcf5-12fa5da705cd,"Successful exploitation will allow attackers to disclose potentially
sensitive information, gain escalated privileges, manipulate certain data, cause a DoS (Denial of Service),
and compromise a vulnerable system.","Update to version 5.5.39, 5.6.20 or later.","Oracle MySQL Server versions 5.5.38 and prior and 5.6 through 5.6.19.","Unspecified errors in the MySQL Server component via unknown vectors
related to CLIENT:MYSQLADMIN, CLIENT:MYSQLDUMP, SERVER:MEMORY STORAGE ENGINE, SERVER:SSL:yaSSL, SERVER:DML,
SERVER:SSL:yaSSL, SERVER:REPLICATION ROW FORMAT BINARY LOG DML, SERVER:CHARACTER SETS, and SERVER:MyISAM.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.38 / 5.6 <= 5.6.19 Security Update (cpuoct2014) -...
(OID: 1.3.6.1.4.1.25623.1.0.804782)
Version used: 2021-02-12T19:09:59+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1604,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2014-1567,DFN-CERT-2014-1500,DFN-CERT-2014-1489,DFN-CERT-2014-1357,DFN-CERT-2013-0259,CB-K15/1518,CB-K15/0567,CB-K15/0415,CB-K14/1482,CB-K14/1420,CB-K14/1412,CB-K14/1299",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.31 / 5.6 <= 5.6.11 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.806878,"CVE-2016-0502",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,35da613d-7d28-44a4-a714-cffc2cef0ac3,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.31 and prior and 5.6 through 5.6.11.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.31 / 5.6 <= 5.6.11 Security Update (cpujan2016) -...
(OID: 1.3.6.1.4.1.25623.1.0.806878)
Version used: 2022-09-12T18:18:03+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 04 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811436,"CVE-2017-3633,CVE-2017-3634,CVE-2017-3649,CVE-2017-3647",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0efe44ed-eb44-43b1-b608-7d5433dc9b49,"Successful exploitation of this vulnerability
will allow remote to partially modify data and cause denial of service conditions.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.36 and earlier,
5.7.18 and earlier, on Windows","Multiple flaws exist due to

- A flaw in the Server: Memcached component.

- A flaw in the Server: DML component.

- A flaw in the Server: Replication component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jul2017-3236622) 04 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811436)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1243,CB-K17/1732,CB-K17/1604,CB-K17/1205",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.50 / 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809374,"CVE-2016-5612",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,52d394f1-541d-4e78-b105-1eda5a21ff07,"Successful exploitation of this vulnerability will allow a remote
authenticated user to cause denial of service conditions.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.50 and prior, 5.6 through 5.6.31 and 5.7 through 5.7.13.","The flaw exists due to an unspecified error in the 'Server: DML'
component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.50 / 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.809374)
Version used: 2022-07-21T18:11:30+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1790,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1742,CB-K16/1714,CB-K16/1624",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Update (cpujul2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.45
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.142645,"CVE-2019-2805,CVE-2019-2740,CVE-2019-2819,CVE-2019-2739,CVE-2019-2737,CVE-2019-2738",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7c7003e0-fafd-4871-b642-ffecb6f61c4c,"","Update to version 5.6.45, 5.7.27, 8.0.17 or later.","Oracle MySQL Server versions 5.6.44 and prior, 5.7 through 5.7.26 and 8.0 through 8.0.16.","Oracle MySQL Server is prone to multiple denial of service vulnerabilities.

For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.142645)
Version used: 2023-10-28T00:11:32+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-2620,DFN-CERT-2020-2180,DFN-CERT-2020-0658,DFN-CERT-2020-0517,DFN-CERT-2019-2695,DFN-CERT-2019-2656,DFN-CERT-2019-2300,DFN-CERT-2019-2008,DFN-CERT-2019-1713,DFN-CERT-2019-1683,DFN-CERT-2019-1568,DFN-CERT-2019-1453,CB-K19/0620",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 / 8.0 <= 8.0.17 Security Update (cpuoct2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.46
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.143030,"CVE-2019-2974,CVE-2019-2911",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,994d89c7-6faf-4a61-bc5e-c49a8300f5e2,"","Update to version 5.6.46, 5.7.28, 8.0.18 or later.","Oracle MySQL Server versions 5.6.45 and prior, 5.7 through 5.7.27 and 8.0 through 8.0.17.","Oracle MySQL Server is prone to multiple vulnerabilities.

For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 / 8.0 <= 8.0.17 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.143030)
Version used: 2021-09-07T22:01:38+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-2763,DFN-CERT-2020-2756,DFN-CERT-2020-2620,DFN-CERT-2020-2299,DFN-CERT-2020-2180,DFN-CERT-2020-1827,DFN-CERT-2020-0658,DFN-CERT-2020-0517,DFN-CERT-2020-0103,DFN-CERT-2019-2695,DFN-CERT-2019-2687,DFN-CERT-2019-2656,DFN-CERT-2019-2301,DFN-CERT-2019-2149,CB-K20/1030,CB-K20/0109,CB-K19/0915",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.46 Security Update (cpujan2020) - Windows","Oracle MySQL Server is prone to an unspecified denial of service vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.47
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.143359,"CVE-2020-2579",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0b7966d8-f0ec-48b4-bd1a-a748c9f622fa,"","Update to version 5.6.47 or later.","Oracle MySQL Server versions 5.6.46 and prior.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.46 Security Update (cpujan2020) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.143359)
Version used: 2021-08-16T17:00:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-1827,DFN-CERT-2020-1078,DFN-CERT-2020-0096,CB-K20/0038",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.49 / 5.7 <= 5.7.31 / 8.0 <= 8.0.21 Security Update (cpuoct2020) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.50
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.108959,"CVE-2020-14765,CVE-2020-14769,CVE-2020-14812,CVE-2020-14793,CVE-2020-14672,CVE-2020-14867",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b50ec0ee-64bf-4e71-a755-ae3adbef647a,"","Update to version 5.6.50, 5.7.32, 8.0.22 or later.","Oracle MySQL Server versions 5.6.49 and prior, 5.7 through 5.7.31 and 8.0 through 8.0.21.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.49 / 5.7 <= 5.7.31 / 8.0 <= 8.0.21 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.108959)
Version used: 2021-08-16T20:00:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-2155,DFN-CERT-2021-0002,DFN-CERT-2020-2763,DFN-CERT-2020-2756,DFN-CERT-2020-2620,DFN-CERT-2020-2380,DFN-CERT-2020-2295,CB-K20/1066,CB-K20/1017",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.33
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145794,"CVE-2020-1971,CVE-2021-2178,CVE-2021-2202",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0aa50262-bb05-490d-9557-a0595d6a4e58,"","Update to version 5.7.33, 8.0.23 or later.","Oracle MySQL Server version 5.7.32 and prior and 8.0 through 8.0.22.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpuapr2021) -...
(OID: 1.3.6.1.4.1.25623.1.0.145794)
Version used: 2023-10-21T00:09:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-1582,DFN-CERT-2022-1215,DFN-CERT-2022-0076,DFN-CERT-2021-2190,DFN-CERT-2021-2155,DFN-CERT-2021-2126,DFN-CERT-2021-1504,DFN-CERT-2021-1225,DFN-CERT-2021-0924,DFN-CERT-2021-0862,DFN-CERT-2021-0828,DFN-CERT-2021-0826,DFN-CERT-2021-0821,DFN-CERT-2021-0819,DFN-CERT-2021-0715,DFN-CERT-2021-0408,DFN-CERT-2021-0338,DFN-CERT-2021-0255,DFN-CERT-2021-0134,DFN-CERT-2021-0131,DFN-CERT-2021-0128,DFN-CERT-2021-0120,DFN-CERT-2021-0107,DFN-CERT-2021-0078,DFN-CERT-2021-0012,DFN-CERT-2020-2791,DFN-CERT-2020-2668,WID-SEC-2024-0794,WID-SEC-2023-0067,WID-SEC-2023-0065,WID-SEC-2022-2047,WID-SEC-2022-1908,WID-SEC-2022-1000,WID-SEC-2022-0585,CB-K21/1065,CB-K21/0788,CB-K21/0615,CB-K21/0421,CB-K21/0111,CB-K21/0062,CB-K21/0006,CB-K20/1217",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Update (cpuoct2018 - 01) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: See reference
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.814256,"CVE-2018-3156,CVE-2018-3251,CVE-2018-3278,CVE-2018-3276,CVE-2018-3143,CVE-2018-3247",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6bd9077d-cf7b-4e0d-956b-fc21cec40706,"Successful exploitation will allow remote
attackers to have an impact on integrity and availability.","The vendor has released updates. Please see the references for
more information.","Oracle MySQL version 5.6.x through 5.6.41,
5.7.x through 5.7.23, 8.0.x through 8.0.12.","Multiple flaws exist due to:

- Multiple unspecified errors within 'InnoDB' component of MySQL Server.

- An unspecified error within 'Server: Merge' component of MySQL Server.

- An unspecified error within 'Server: Memcached' component of MySQL Server.

- An unspecified error within 'Server: RBR' component of MySQL Server.","Checks if a vulnerable version is present
on the target host.
Details:
Oracle Mysql Security Update (cpuoct2018 - 01) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.814256)
Version used: 2023-11-04T00:10:08+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1588,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0484,DFN-CERT-2019-0112,DFN-CERT-2018-2273,DFN-CERT-2018-2110,WID-SEC-2023-1594,CB-K18/1005",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 04 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.810886,"CVE-2017-3452",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,901a8631-b4cd-458f-ae03-c413363f40cd,"Successful exploitation of this vulnerability
will allow remote attackers to conduct denial-of-service attacks.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.35 and earlier on
Windows","The flaw exists due to some unspecified error
in the 'Server: Optimizer' component of application.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2017-3236618) 04 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.810886)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2017-1675,DFN-CERT-2017-0675,CB-K17/1604,CB-K17/0657",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2018-3678067) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.813144,"CVE-2018-2766,CVE-2018-2782,CVE-2018-2784,CVE-2018-2787,CVE-2018-2758",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b448c10a-4f65-4299-a3d5-d7b356bd99c9,"Successful exploitation of this
vulnerability will allow remote attackers to conduct a denial of service
condition and have an impact on integrity.","Apply the latest patch from vendor. Please see the references for more information.","Oracle MySQL versions 5.6.39 and earlier,
5.7.21 and earlier on Windows","Multiple flaws exist due to

- Multiple errors in 'InnoDB' component of the MySQL Server.

- An error in the 'Server:Security:Privileges' component of the MySQL Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2018-3678067) 02 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.813144)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0913,DFN-CERT-2018-0723,WID-SEC-2023-1594,CB-K18/0608",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 02 - Windows","Oracle MySQL is prone to multiple denial of service (DoS) vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.812646,"CVE-2018-2668,CVE-2018-2665,CVE-2018-2622,CVE-2018-2640",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b8356d73-0702-4b9c-ba94-f5c14270c5d9,"Successful exploitation of these vulnerabilities
will allow remote attackers to conduct a denial-of-service attack.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.58 and earlier,
5.6.38 and earlier, 5.7.20 and earlier on Windows","Multiple flaws exist due to:

- An error in the 'Server: DDL' component.

- Multiple errors in the 'Server: Optimizer' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jan2018-3236628) 02 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.812646)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0515,DFN-CERT-2018-0424,DFN-CERT-2018-0286,DFN-CERT-2018-0101,CB-K18/0480,CB-K18/0392,CB-K18/0265,CB-K18/0096",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 02 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.811986,"CVE-2017-10378",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,45d5338a-7bf3-46c6-bbb0-d1b1ad259a21,"Successful exploitation of this vulnerability
will allow remote attackers to compromise availability of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.57 and earlier,
5.6.37 and earlier, 5.7.11 and earlier on Windows.","The flaw exists due to an error in
'Server: Optimizer'","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (oct2017-3236626) 02 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811986)
Version used: 2023-07-25T13:05:58+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0515,DFN-CERT-2018-0260,DFN-CERT-2018-0242,DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K18/0480,CB-K18/0242,CB-K18/0224,CB-K17/2048,CB-K17/1748",""
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 04 - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.811991,"CVE-2017-10379,CVE-2017-10384,CVE-2017-10268",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,44c9596a-feb2-4134-a88e-e39eb7a643e6,"Successful exploitation of this
vulnerability will allow remote to compromise availability confidentiality,
and integrity of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.57 and earlier,
5.6.37 and earlier, 5.7.19 and earlier on Windows.","Multiple flaws exist due to:

- An error in 'Client programs' component.

- An error in 'Server: DDL'.

- An error in 'Server: Replication'","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (oct2017-3236626) 04 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811991)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0515,DFN-CERT-2018-0260,DFN-CERT-2018-0242,DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K18/0480,CB-K18/0242,CB-K18/0224,CB-K17/2048,CB-K17/1748",""
192.168.8.77,,3306,tcp,6.2,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Update (cpuoct2019) - Windows","Oracle MySQL Server is prone to a local unauthenticated vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.45
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.143032,"CVE-2019-2969",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1e9a6cda-1a16-4df7-9430-c07ae501c4f5,"","Update to version 5.6.45, 5.7.27, 8.0.17 or later.","Oracle MySQL Server versions 5.6.44 and prior, 5.7 through 5.7.26 and 8.0 through 8.0.16.","Easily exploitable vulnerability allows unauthenticated attacker with logon to
the infrastructure where MySQL Server executes to compromise MySQL Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.143032)
Version used: 2021-09-08T16:01:40+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-2149,CB-K19/0915",""
192.168.8.77,,3306,tcp,6.1,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.47 / 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.807928,"CVE-2016-0649,CVE-2016-0650,CVE-2016-0644,CVE-2016-0646,CVE-2016-0640,CVE-2016-0641",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7b1e20d9-b22d-4ab5-93e8-fdce574ace9f,"Successful exploitation will allow an authenticated remote attacker to
affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.47 and prior, 5.6 through 5.6.28 and 5.7 through 5.7.10.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.47 / 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.807928)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0903,DFN-CERT-2016-0845,DFN-CERT-2016-0803,DFN-CERT-2016-0695,DFN-CERT-2016-0644,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0750,CB-K16/0646,CB-K16/0597",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpujul2023) - Windows","Oracle MySQL Server is prone to a unspecified vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.43
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149981,"CVE-2023-22053",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d9f13816-748f-476c-9397-7402ad16bce6,"","Update to version 5.7.43, 8.0.34 or later.","Oracle MySQL Server version 5.7.42 and prior and 8.x through
8.0.33.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpujul2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149981)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-1188,DFN-CERT-2024-0593,DFN-CERT-2024-0491,DFN-CERT-2024-0454,DFN-CERT-2023-1642,WID-SEC-2024-1248,WID-SEC-2023-1794",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to a vulnerability in a third party library.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117194,"CVE-2015-7744",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,115607eb-db76-4a54-9cec-136964d6f278,"The flaw makes it easier for remote attackers to obtain private RSA
keys by capturing TLS handshakes, aka a Lenstra attack.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.45 and prior and 5.6 through 5.6.26.","wolfSSL (formerly CyaSSL) as used in MySQL does not properly handle
faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange
without low memory optimizations on a server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujan2016) -...
(OID: 1.3.6.1.4.1.25623.1.0.117194)
Version used: 2022-08-31T18:10:28+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 06 - Windows","Oracle MySQL is prone to an information disclosure vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811440,"CVE-2017-3732",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9c371e4d-2f01-48b3-81f7-697cc1ee7d82,"Successful exploitation of this vulnerability
will allow remote attackers to get sensitive information.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.35 and earlier,
5.7.17 and earlier on Windows","The flaw exists due to an error in
Security: Encryption (OpenSSL).","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jul2017-3236622) 06 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811440)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-0228,DFN-CERT-2018-1907,DFN-CERT-2018-1675,DFN-CERT-2018-1377,DFN-CERT-2018-1048,DFN-CERT-2018-1036,DFN-CERT-2018-0952,DFN-CERT-2018-0620,DFN-CERT-2018-0512,DFN-CERT-2018-0323,DFN-CERT-2018-0100,DFN-CERT-2018-0011,DFN-CERT-2017-1830,DFN-CERT-2017-1828,DFN-CERT-2017-1827,DFN-CERT-2017-1785,DFN-CERT-2017-1243,DFN-CERT-2017-1236,DFN-CERT-2017-0925,DFN-CERT-2017-0675,DFN-CERT-2017-0608,DFN-CERT-2017-0314,DFN-CERT-2017-0301,DFN-CERT-2017-0219,DFN-CERT-2017-0178,DFN-CERT-2017-0156,WID-SEC-2023-1594,WID-SEC-2022-1914,WID-SEC-2022-0673,CB-K22/0045,CB-K19/0354,CB-K18/0482,CB-K18/0296,CB-K18/0098,CB-K18/0006,CB-K17/1749,CB-K17/1748,CB-K17/1747,CB-K17/1709,CB-K17/1205,CB-K17/1198,CB-K17/0896,CB-K17/0657,CB-K17/0583,CB-K17/0307,CB-K17/0289,CB-K17/0214,CB-K17/0175,CB-K17/0153",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Update (cpuapr2019) - Windows","Oracle MySQL Server is prone to a vulnerability in the libmysqld subcomponent.","Installed version: 5.6.10
Fixed version: 5.6.43
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.142405,"CVE-2018-3123",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,28ebe0ad-d1c3-481e-abcb-c45d41901050,"","Update to version 5.6.43, 5.7.25, 8.0.14 or later.","Oracle MySQL Server versions 5.6.42 and prior, 5.7 through 5.7.24 and 8.0 through 8.0.13.","Difficult to exploit vulnerability allows unauthenticated attacker with
network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can
result in unauthorized access to critical data or complete access to all MySQL Server accessible data.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.142405)
Version used: 2021-09-07T22:01:38+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-0775,WID-SEC-2023-1594,CB-K19/0319",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.807924,"CVE-2016-0666,CVE-2016-0647,CVE-2016-0648,CVE-2016-0642,CVE-2016-0643,CVE-2016-2047",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d1921171-46ec-4b81-997c-57f84a86cadf,"Successful exploitation will allow remote users to affect confidentiality,
integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.11.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.807924)
Version used: 2023-11-03T13:05:46+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1204,DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0903,DFN-CERT-2016-0845,DFN-CERT-2016-0803,DFN-CERT-2016-0695,DFN-CERT-2016-0644,DFN-CERT-2016-0532,DFN-CERT-2016-0143,CB-K16/1129,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0750,CB-K16/0646,CB-K16/0597,CB-K16/0493,CB-K16/0133",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Backronym Vulnerability (Jun 2016) - Windows","Oracle MySQL is prone to the backronym vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.3
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.808063,"CVE-2015-3152",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9c4376fe-2611-4be0-88d9-c6f815f0c965,"Successful exploitation will allow
man-in-the-middle attackers to spoof servers via a cleartext-downgrade
attack.","Upgrade to version Oracle MySQL Server 5.7.3 or
later.","Oracle MySQL Server 5.7.2 and earlier
on Windows.","The flaw exists due to improper validation
of MySQL client library when establishing a secure connection to a MySQL
server using the --ssl option.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Backronym Vulnerability (Jun 2016) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.808063)
Version used: 2024-02-16T13:06:55+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1004,DFN-CERT-2015-1105,DFN-CERT-2015-1096,DFN-CERT-2015-1071,DFN-CERT-2015-1051,DFN-CERT-2015-1016,DFN-CERT-2015-0942,CB-K18/0871,CB-K16/0944,CB-K15/1045,CB-K15/1042,CB-K15/1020,CB-K15/0994,CB-K15/0964,CB-K15/0895",""
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.43 / 5.7 <= 5.7.25 / 8.0 <= 8.0.15 Security Update (cpuapr2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.44
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.142403,"CVE-2019-1559,CVE-2019-2683,CVE-2019-2627,CVE-2019-2614",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,523ebac0-0a2e-48df-89d8-cc143941eeaf,"","Update to version 5.6.44, 5.7.26, 8.0.16 or later.","Oracle MySQL Server versions 5.6.43 and prior, 5.7 through 5.7.25 and 8.0 through 8.0.15.","The attacks range in variety and difficulty. Most of them allow an attacker
with network access via multiple protocols to compromise the MySQL Server.

For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.43 / 5.7 <= 5.7.25 / 8.0 <= 8.0.15 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.142403)
Version used: 2022-03-28T11:06:01+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-2620,DFN-CERT-2020-2189,DFN-CERT-2020-2180,DFN-CERT-2020-0092,DFN-CERT-2020-0048,DFN-CERT-2019-2625,DFN-CERT-2019-2457,DFN-CERT-2019-2300,DFN-CERT-2019-2274,DFN-CERT-2019-2158,DFN-CERT-2019-2157,DFN-CERT-2019-2046,DFN-CERT-2019-2008,DFN-CERT-2019-1996,DFN-CERT-2019-1897,DFN-CERT-2019-1755,DFN-CERT-2019-1746,DFN-CERT-2019-1722,DFN-CERT-2019-1713,DFN-CERT-2019-1683,DFN-CERT-2019-1678,DFN-CERT-2019-1677,DFN-CERT-2019-1617,DFN-CERT-2019-1614,DFN-CERT-2019-1486,DFN-CERT-2019-1460,DFN-CERT-2019-1455,DFN-CERT-2019-1453,DFN-CERT-2019-1450,DFN-CERT-2019-1408,DFN-CERT-2019-1240,DFN-CERT-2019-0968,DFN-CERT-2019-0781,DFN-CERT-2019-0775,DFN-CERT-2019-0771,DFN-CERT-2019-0566,DFN-CERT-2019-0556,DFN-CERT-2019-0412,WID-SEC-2023-2946,WID-SEC-2023-1594,WID-SEC-2022-0673,WID-SEC-2022-0462,CB-K22/0045,CB-K20/0041,CB-K19/0911,CB-K19/0639,CB-K19/0623,CB-K19/0622,CB-K19/0620,CB-K19/0619,CB-K19/0615,CB-K19/0332,CB-K19/0320,CB-K19/0319,CB-K19/0173",""
192.168.8.77,,3306,tcp,5.8,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-05 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803727,"CVE-2013-3811,CVE-2013-3806,CVE-2013-3810,CVE-2013-3807,CVE-2013-3798,CVE-2013-3796,CVE-2013-3795",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,654cfb12-5a92-4805-831b-3d33b9b124f6,"Successful exploitation will allow remote authenticated users to affect
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.6.11 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to InnoDB, XA Transactions, Server Privileges, MemCached, Server Optimizer and Data Manipulation Language.","Checks if a vulnerable version is present on the target host.
Details:
MySQL Unspecified vulnerabilities-05 (Jul 2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.803727)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/0620",""
192.168.8.77,,3306,tcp,5.7,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-03 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805172,"CVE-2015-2571,CVE-2015-0505,CVE-2015-0501,CVE-2015-0499",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,78635e08-bb06-4eb5-a3f8-fa96e05ef36f,"Successful exploitation will allow an
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.42 and earlier,
and 5.6.23 and earlier on windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to Server : Optimizer, DDL,
Server : Compiling, Server : Federated.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-03 (Apr 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805172)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1623,DFN-CERT-2015-1604,DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1105,DFN-CERT-2015-1096,DFN-CERT-2015-1016,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/1518,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1042,CB-K15/0964,CB-K15/0720,CB-K15/0531",""
192.168.8.232,,3718,tcp,5.3,Medium,80,"Mitigation","Weak Host Key Algorithm(s) (SSH)","The remote SSH server is configured to allow / support weak host
key algorithm(s).","The remote SSH server supports the following weak host key algorithm(s):

host key algorithm | Description
-----------------------------------------------------------------------------------------
ssh-dss | Digital Signature Algorithm (DSA) / Digital Signature Standard (DSS)
",1.3.6.1.4.1.25623.1.0.117687,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,3a8caedc-af78-46dd-ace3-92408a038dae,"","Disable the reported weak host key algorithm(s).","","","Checks the supported host key algorithms of the remote SSH
server.

Currently weak host key algorithms are defined as the following:

- ssh-dss: Digital Signature Algorithm (DSA) / Digital Signature Standard (DSS)
Details:
Weak Host Key Algorithm(s) (SSH)
(OID: 1.3.6.1.4.1.25623.1.0.117687)
Version used: 2023-10-12T13:05:32+08:00
","","","",""
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 Security Update (cpuoct2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.46
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.143034,"CVE-2019-2922,CVE-2019-2923,CVE-2019-2924,CVE-2019-2910",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0b923c30-431c-41dc-b028-4f8c86b8b3ab,"","Update to version 5.6.46, 5.7.28 or later.","Oracle MySQL Server versions 5.6.45 and prior and 5.7 through 5.7.27.","Oracle MySQL Server is prone to multiple vulnerabilities.

For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 Security Update (cpuoct2019) -...
(OID: 1.3.6.1.4.1.25623.1.0.143034)
Version used: 2021-09-08T16:01:40+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2020-0103,DFN-CERT-2019-2149,CB-K19/0915",""
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.46 / 5.7 <= 5.7.26 Security Update (cpuapr2020) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities in OpenSSL.","Installed version: 5.6.10
Fixed version: 5.6.47
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.143735,"CVE-2019-1547,CVE-2019-1549,CVE-2019-1552,CVE-2019-1563",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e2866c53-fbc3-40cc-9f60-0d6b608cbd42,"","Update to version 5.6.47, 5.7.27 or later.","Oracle MySQL Server versions 5.6.46 and prior and 5.7 through 5.7.26.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.46 / 5.7 <= 5.7.26 Security Update (cpuapr2020) -...
(OID: 1.3.6.1.4.1.25623.1.0.143735)
Version used: 2021-08-16T17:00:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-2709,DFN-CERT-2020-2014,DFN-CERT-2020-1729,DFN-CERT-2020-0895,DFN-CERT-2020-0776,DFN-CERT-2020-0775,DFN-CERT-2020-0772,DFN-CERT-2020-0716,DFN-CERT-2020-0277,DFN-CERT-2020-0101,DFN-CERT-2020-0096,DFN-CERT-2020-0091,DFN-CERT-2020-0090,DFN-CERT-2019-2164,DFN-CERT-2019-2149,DFN-CERT-2019-1900,DFN-CERT-2019-1897,DFN-CERT-2019-1559,WID-SEC-2023-3081,WID-SEC-2023-1762,WID-SEC-2023-1049,WID-SEC-2022-0673,CB-K22/0045,CB-K20/1049,CB-K20/1016,CB-K20/0321,CB-K20/0318,CB-K20/0043,CB-K20/0038,CB-K20/0036,CB-K20/0028,CB-K19/1025,CB-K19/0919,CB-K19/0915,CB-K19/0808,CB-K19/0675",""
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.30 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.40
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.118388,"CVE-2022-2097,CVE-2022-21617,CVE-2022-21608",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e39d58a6-cd20-461f-b857-1f0a7a9038b2,"","Update to version 5.7.40, 8.0.31 or later.","Oracle MySQL Server version 5.7.39 and prior and 8.0 through
8.0.30.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.30 Security Update (cpuoct2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.118388)
Version used: 2022-10-24T18:14:58+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0147,DFN-CERT-2023-2667,DFN-CERT-2023-2491,DFN-CERT-2023-1230,DFN-CERT-2023-1058,DFN-CERT-2023-0509,DFN-CERT-2023-0299,DFN-CERT-2023-0100,DFN-CERT-2022-2323,DFN-CERT-2022-2315,DFN-CERT-2022-2306,DFN-CERT-2022-2150,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-1905,DFN-CERT-2022-1646,DFN-CERT-2022-1536,DFN-CERT-2022-1521,DFN-CERT-2022-1520,DFN-CERT-2022-1515,DFN-CERT-2022-1497,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2023-2031,WID-SEC-2023-1969,WID-SEC-2023-1432,WID-SEC-2022-1777,WID-SEC-2022-1776,WID-SEC-2022-1461,WID-SEC-2022-1245,WID-SEC-2022-1146,WID-SEC-2022-1068,WID-SEC-2022-1065,WID-SEC-2022-0561",""
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811432,"CVE-2017-3651,CVE-2017-3653,CVE-2017-3652,CVE-2017-3635,CVE-2017-3648,CVE-2017-3641",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,717fcf5b-9e74-4143-b8e8-372165449061,"Successful exploitation of this vulnerability
will allow remote attackers to have an impact on confidentiality, integrity and
availability.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.56 and earlier,
5.6.36 and earlier, 5.7.18 and earlier, on Windows","Multiple flaws exist due to

- A flaw in the Client mysqldump component.

- A flaw in the Server: DDL component.

- A flaw in the C API component.

- A flaw in the Connector/C component.

- A flaw in the Server: Charsets component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jul2017-3236622) 02 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811432)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1956,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1519,DFN-CERT-2017-1465,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-1243,CB-K18/0224,CB-K17/1870,CB-K17/1732,CB-K17/1604,CB-K17/1453,CB-K17/1401,CB-K17/1298,CB-K17/1239,CB-K17/1205",""
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 03 - Windows","Oracle MySQL is prone to vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811434,"CVE-2017-3636",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b6e51401-7e7d-48e6-a25b-2e0a37093458,"Successful exploitation of this vulnerability
will allow remote attackers to partially access data, partially modify data,
and partially deny service.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.56 and earlier,
5.6.36 and earlier, on Windows","The flaw exists due to an error in the Client
programs component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jul2017-3236622) 03 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811434)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1956,DFN-CERT-2017-1675,DFN-CERT-2017-1519,DFN-CERT-2017-1465,DFN-CERT-2017-1282,DFN-CERT-2017-1243,CB-K18/0224,CB-K17/1870,CB-K17/1604,CB-K17/1453,CB-K17/1401,CB-K17/1239,CB-K17/1205",""
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 03 - Windows","Oracle MySQL is prone to a security bypass vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.810884,"CVE-2017-3305",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6cf7359a-d9b1-4b2a-9f32-23a2feb4def0,"Successful exploitation of this vulnerability
will allow remote attackers to bypass certain security restrictions and perform
unauthorized actions by conducting a man-in-the-middle attack. This may lead to
other attacks also.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.54 and earlier,
5.6.35 and earlier on Windows","The flaw exists due to an incorrect
implementation or enforcement of 'ssl-mode=REQUIRED' in MySQL.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (apr2017-3236618) 03 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.810884)
Version used: 2023-07-25T13:05:58+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2017-1675,DFN-CERT-2017-1282,DFN-CERT-2017-0675,CB-K17/1604,CB-K17/1239,CB-K17/0657",""
192.168.8.77,,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:

Port: 49664/tcp

UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49664]

Port: 49665/tcp

UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49665]
Annotation: Event log TCPIP

Port: 49666/tcp

UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49666]

UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49666]

Port: 49667/tcp

UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]

UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]
Named pipe : spoolss
Win32 service or process : spoolsv.exe
Description : Spooler service

UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]

UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]

UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]

Port: 49669/tcp

UUID: 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49669]
Annotation: Remote Fw APIs

Port: 49670/tcp

UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : SAM access

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
Annotation: KeyIso

Port: 49754/tcp

UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
Endpoint: ncacn_ip_tcp:192.168.8.77[49754]

Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c1832f51-4ddd-4946-8df8-4846fca431cd,"An attacker may use this fact to gain more knowledge
about the remote host.","Filter incoming traffic to this ports.","","","
Details:
DCE/RPC and MSRPC Services Enumeration Reporting
(OID: 1.3.6.1.4.1.25623.1.0.10736)
Version used: 2022-06-03T18:17:07+08:00
","","","",""
192.168.8.84,,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:

Port: 49664/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
Annotation: RemoteAccessCheck

UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : SAM access

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
Annotation: KeyIso

Port: 49665/tcp

UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49665]

Port: 49666/tcp

UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49666]
Annotation: Event log TCPIP

Port: 49667/tcp

UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49667]

UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49667]

Port: 49669/tcp

UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]

UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]
Named pipe : spoolss
Win32 service or process : spoolsv.exe
Description : Spooler service

UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]

UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]

UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]

Port: 49670/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
Annotation: RemoteAccessCheck

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
Annotation: KeyIso

Port: 49694/tcp

UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
Endpoint: ncacn_ip_tcp:192.168.8.84[49694]

Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f75c3cef-9c64-4989-a59d-d732ef073c3f,"An attacker may use this fact to gain more knowledge
about the remote host.","Filter incoming traffic to this ports.","","","
Details:
DCE/RPC and MSRPC Services Enumeration Reporting
(OID: 1.3.6.1.4.1.25623.1.0.10736)
Version used: 2022-06-03T18:17:07+08:00
","","","",""
192.168.8.77,,3306,tcp,5.0,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-03 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803725,"CVE-2013-3801,CVE-2013-3805,CVE-2013-3794",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,345a020e-cb59-440e-96f2-1fe12308cba5,"Successful exploitation will allow remote authenticated users to affect
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.5.30 and earlier and 5.6.10 on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Prepared Statements, Server Options and Server Partition.","Checks if a vulnerable version is present on the target host.
Details:
MySQL Unspecified vulnerabilities-03 (Jul 2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.803725)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-1937,DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/0919,CB-K13/0620",""
192.168.8.85,yilan950502.tahoho.com.tw,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:

Port: 49664/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
Annotation: RemoteAccessCheck

UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : SAM access

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
Annotation: KeyIso

Port: 49665/tcp

UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49665]

Port: 49666/tcp

UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49666]

UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49666]

Port: 49667/tcp

UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49667]
Annotation: Windows Event Log

Port: 49668/tcp

UUID: 29770a8f-829b-4158-90a2-78cd488501f7, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49668]

Port: 49673/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
Annotation: RemoteAccessCheck

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
Annotation: KeyIso

Port: 49694/tcp

UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
Endpoint: ncacn_ip_tcp:192.168.8.85[49694]

Port: 60083/tcp

UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]

UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]
Named pipe : spoolss
Win32 service or process : spoolsv.exe
Description : Spooler service

UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]

UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]

UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]

Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,cd6d71e4-4088-4056-963e-88c518972c49,"An attacker may use this fact to gain more knowledge
about the remote host.","Filter incoming traffic to this ports.","","","
Details:
DCE/RPC and MSRPC Services Enumeration Reporting
(OID: 1.3.6.1.4.1.25623.1.0.10736)
Version used: 2022-06-03T18:17:07+08:00
","","","",""
192.168.8.111,,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:

Port: 49664/tcp

UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49664]

Port: 49665/tcp

UUID: 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]
Annotation: DHCP Client LRPC Endpoint

UUID: a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]

UUID: d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]

UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]
Annotation: Event log TCPIP

Port: 49666/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Annotation: RemoteAccessCheck

UUID: 12345678-1234-abcd-ef00-01234567cffb, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Named pipe : lsass
Win32 service or process : Netlogon
Description : Net Logon service

UUID: 12345778-1234-abcd-ef00-0123456789ab, version 0
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : LSA access

UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : SAM access

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Annotation: KeyIso

UUID: c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Annotation: Impl friendly name

UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
Annotation: MS NT Directory DRS Interface

Port: 49667/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Annotation: RemoteAccessCheck

UUID: 12345678-1234-abcd-ef00-01234567cffb, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Named pipe : lsass
Win32 service or process : Netlogon
Description : Net Logon service

UUID: 12345778-1234-abcd-ef00-0123456789ab, version 0
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : LSA access

UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : SAM access

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Annotation: KeyIso

UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
Annotation: MS NT Directory DRS Interface

Port: 49669/tcp

UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
Endpoint: ncacn_http:192.168.8.111[49669]
Annotation: RemoteAccessCheck

UUID: 12345678-1234-abcd-ef00-01234567cffb, version 1
Endpoint: ncacn_http:192.168.8.111[49669]
Named pipe : lsass
Win32 service or process : Netlogon
Description : Net Logon service

UUID: 12345778-1234-abcd-ef00-0123456789ab, version 0
Endpoint: ncacn_http:192.168.8.111[49669]
Named pipe : lsass
Win32 service or process : lsass.exe
Description : LSA access

UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
Endpoint: ncacn_http:192.168.8.111[49669]
Annotation: Ngc Pop Key Service

UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
Endpoint: ncacn_http:192.168.8.111[49669]
Annotation: Ngc Pop Key Service

UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
Endpoint: ncacn_http:192.168.8.111[49669]
Annotation: KeyIso

UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4
Endpoint: ncacn_http:192.168.8.111[49669]
Annotation: MS NT Directory DRS Interface

Port: 49670/tcp

UUID: 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: UserMgrCli

UUID: 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: AppInfo

UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]

UUID: 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: AppInfo

UUID: 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: AppInfo

UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]

UUID: a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: IKE/Authip API

UUID: b18fbab6-56f8-4702-84e0-41053293a869, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: UserMgrCli

UUID: d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]

UUID: fb9a3757-cff0-4db0-b9fc-bd6c131612fd, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: AppInfo

UUID: fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
Annotation: AppInfo

Port: 49687/tcp

UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]

UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]
Named pipe : spoolss
Win32 service or process : spoolsv.exe
Description : Spooler service

UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]

UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]

UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]

Port: 49705/tcp

UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
Endpoint: ncacn_ip_tcp:192.168.8.111[49705]

Port: 49731/tcp

UUID: 50abc2a4-574d-40b3-9d66-ee4fd5fba076, version 5
Endpoint: ncacn_ip_tcp:192.168.8.111[49731]
Named pipe : dnsserver
Win32 service or process : dns.exe
Description : DNS Server

Port: 49801/tcp

UUID: 897e2e5f-93f3-4376-9c9c-fd2277495c27, version 1
Endpoint: ncacn_ip_tcp:192.168.8.111[49801]
Annotation: Frs2 Service

Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ffce65e4-0015-4563-8ab3-2284cf5ebba1,"An attacker may use this fact to gain more knowledge
about the remote host.","Filter incoming traffic to this ports.","","","
Details:
DCE/RPC and MSRPC Services Enumeration Reporting
(OID: 1.3.6.1.4.1.25623.1.0.10736)
Version used: 2022-06-03T18:17:07+08:00
","","","",""
192.168.8.77,,3306,tcp,5.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-02 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805171,"CVE-2015-2573,CVE-2015-2568,CVE-2015-0441,CVE-2015-0433",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a322cad9-44e3-4bd1-831d-a272e4d16ee2,"Successful exploitation will allow an
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.41 and earlier,
and 5.6.22 and earlier on windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to DDL, Server : Security : Privileges,
Server : Security : Encryption, InnoDB : DML.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-02 (Apr 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805171)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1623,DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1105,DFN-CERT-2015-1096,DFN-CERT-2015-1016,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1042,CB-K15/0964,CB-K15/0720,CB-K15/0531",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpujan2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.51
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145224,"CVE-2021-2022,CVE-2021-2060",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,91c090da-1551-4c79-ac3e-6d851881fe09,"","Update to version 5.6.51, 5.7.33, 8.0.23 or later.","Oracle MySQL Server versions 5.6.50 and prior, 5.7 through 5.7.32 and 8.0 through 8.0.22.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.32 / 8.0 <= 8.0.22 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.145224)
Version used: 2021-08-26T21:01:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-2155,DFN-CERT-2021-0131,WID-SEC-2023-0067,CB-K21/0062",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 07 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.811997,"CVE-2017-10279",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f3a38c66-f2b2-4da2-ba0c-8e1061ed0fe4,"Successful exploitation of this vulnerability
will allow remote attackers to compromise on availability of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version
5.6.36 and earlier, 5.7.18 and earlier on Windows.","The flaw exists due to an error in
'Server: Optimizer' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (oct2017-3236626) 07 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.811997)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K17/2048,CB-K17/1748",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpujan2021) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.51
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145222,"CVE-2021-2001",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a622115b-38cb-4326-a656-cd6e4a79bf39,"Successful attacks of this vulnerability can result in the unauthorized ability
to cause a hang or frequently repeatedly crash (complete DOS) the MySQL Server.","Update to version 5.6.51, 5.7.31, 8.0.18 or later.","Oracle MySQL Server versions 5.6.50 and prior, 5.7 through 5.7.30 and 8.0 through 8.0.17.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.30 / 8.0 <= 8.0.17 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.145222)
Version used: 2021-08-26T21:01:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-2155,DFN-CERT-2021-0810,DFN-CERT-2021-0131,WID-SEC-2023-0067,CB-K21/0062",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 05 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.812652,"CVE-2018-2591",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c1514512-2375-4c8a-83d2-05bac53b5f40,"Successful exploitation of this vulnerability
will allow remote attackers to conduct a denial-of-service attack.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.38 and earlier,
5.7.19 and earlier on Windows","The flaw exists due to an error in the
'Server : Partition' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle Mysql Security Updates (jan2018-3236628) 05 - Windows
(OID: 1.3.6.1.4.1.25623.1.0.812652)
Version used: 2024-02-29T22:37:57+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2018-0101,CB-K18/0096",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.31
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145804,"CVE-2021-2160",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f4a5be67-a937-46f2-8890-e2f114822082,"","Update to version 5.7.31, 8.0.18 or later.","Oracle MySQL Server version 5.7.30 and prior and 8.0 through 8.0.17.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpuapr2021) -...
(OID: 1.3.6.1.4.1.25623.1.0.145804)
Version used: 2021-08-26T21:01:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2021-0821,WID-SEC-2023-0065,CB-K21/0421",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.33 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.34
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.145802,"CVE-2021-2154",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fa6fe2a6-e1b3-47f1-acb0-0eee2e073338,"","Update to version 5.7.34 or later.","Oracle MySQL Server version 5.7.33 and prior.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.33 Security Update (cpuapr2021) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.145802)
Version used: 2021-08-26T21:01:12+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-1241,DFN-CERT-2022-0933,DFN-CERT-2022-0666,DFN-CERT-2021-1660,DFN-CERT-2021-0984,DFN-CERT-2021-0821,WID-SEC-2023-0065,CB-K21/0421",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.40 Security Update (cpujan2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.41
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149168,"CVE-2023-21840",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0980fbb1-a224-4cce-ae36-067ba914aa9c,"","Update to version 5.7.41 or later.","Oracle MySQL Server version 5.7.40 and prior.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.40 Security Update (cpujan2023) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.149168)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-0105,WID-SEC-2023-1424,WID-SEC-2023-0126",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809370,"CVE-2016-5507",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f9ffd31b-9fc7-40b6-a4de-d13a748af363,"Successful exploitation of this vulnerability will allow remote
attackers to cause a denial of service.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.32 and 5.7 through 5.7.14.","The flaw exists due to an unspecified vulnerability.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct201...
(OID: 1.3.6.1.4.1.25623.1.0.809370)
Version used: 2022-08-29T18:21:34+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1624",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.31 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.7.43
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.151212,"CVE-2023-22015,CVE-2023-22026",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,86cd7fa0-2aba-4855-afec-d97f17b6fd7c,"","Update to version 5.7.43, 8.0.32 or later.","Oracle MySQL Server version 5.7.42 and prior and 8.x through
8.0.31.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.31 Security Update (cpuoct2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.151212)
Version used: 2023-10-20T13:06:03+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-2536,WID-SEC-2023-2690",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpujul2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.42
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149979,"CVE-2023-22007",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e7ae81bc-89d7-46cc-bb13-10076f79dd88,"","Update to version 5.7.42, 8.0.33 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
8.0.32.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpujul2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149979)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-1188,DFN-CERT-2024-0593,DFN-CERT-2024-0454,DFN-CERT-2023-1642,WID-SEC-2023-1794",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.31 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to denial of service (DoS)
vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.44
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.151216,"CVE-2023-22028",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0d5549a7-7d89-40b9-9d7d-607a7e1e7131,"","Update to version 5.7.44, 8.0.32 or later.","Oracle MySQL Server version 5.7.43 and prior and 8.x through
8.0.31.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.31 Security Update (cpuoct2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.151216)
Version used: 2023-10-20T13:06:03+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2024-0108,DFN-CERT-2023-2536,WID-SEC-2023-2690",""
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server Component Replication Unspecified vulnerability (Oct 2013) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804034,"CVE-2013-5807",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,da5af193-3fff-4814-856f-593d1b7b2dee,"Successful exploitation will allow remote attackers to disclose sensitive
information, manipulate certain data, cause a DoS (Denial of Service) and
bypass certain security restrictions.","Apply the patch from the referenced advisory.","Oracle MySQL versions 5.5.10 through 5.5.32 and 5.6.x through 5.6.12 on Windows","Unspecified error in the MySQL Server component via unknown vectors related
to Replication.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server Component 'Replication' Unspecified vulnerability (Oct 2...
(OID: 1.3.6.1.4.1.25623.1.0.804034)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0190,DFN-CERT-2013-2099,DFN-CERT-2013-1846,DFN-CERT-2013-1795,CB-K14/0187,CB-K13/1072,CB-K13/0840,CB-K13/0789",""
192.168.8.230,,80,tcp,4.8,Medium,80,"Workaround","Cleartext Transmission of Sensitive Information via HTTP","The host / application transmits sensitive information (username, passwords) in
cleartext via HTTP.","The following input fields were identified (URL:input name):

http://192.168.8.230/:PD
",1.3.6.1.4.1.25623.1.0.108440,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e1f1c768-8449-40af-8129-17ad3b558a76,"An attacker could use this situation to compromise or eavesdrop on the
HTTP communication between the client and the server using a man-in-the-middle attack to get access to
sensitive data like usernames or passwords.","Enforce the transmission of sensitive data via an encrypted SSL/TLS connection.
Additionally make sure the host / application is redirecting all users to the secured SSL/TLS connection before
allowing to input sensitive data into the mentioned functions.","Hosts / applications which doesn't enforce the transmission of sensitive data via an
encrypted SSL/TLS connection.","","Evaluate previous collected information and check if the host / application is not
enforcing the transmission of sensitive data via an encrypted SSL/TLS connection.

The script is currently checking the following:

- HTTP Basic Authentication (Basic Auth)

- HTTP Forms (e.g. Login) with input field of type 'password'
Details:
Cleartext Transmission of Sensitive Information via HTTP
(OID: 1.3.6.1.4.1.25623.1.0.108440)
Version used: 2023-09-07T13:05:21+08:00
","","","",""
192.168.8.77,,3306,tcp,4.6,Medium,80,"VendorFix","Oracle MySQL Server 5.5 <= 5.5.29 / 5.6 <= 5.6.11 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.11
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117213,"CVE-2013-1523",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,dcd3b021-2238-44fe-ae1b-b10ce3680d37,"","Update to version 5.5.30, 5.6.11 or later.","Oracle MySQL Server versions 5.5 through 5.5.29 and 5.6 through 5.6.10.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.5 <= 5.5.29 / 5.6 <= 5.6.11 Security Update (cpuapr201...
(OID: 1.3.6.1.4.1.25623.1.0.117213)
Version used: 2021-02-12T19:09:59+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-0798",""
192.168.8.77,,3306,tcp,4.4,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.37
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.118382,"CVE-2022-21595",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0fd0c596-059f-47cb-80e8-81dd55797df3,"","Update to version 5.7.37, 8.0.28 or later.","Oracle MySQL Server version 5.7.36 and prior and 8.0 through
8.0.27.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpuoct2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.118382)
Version used: 2023-10-19T13:05:21+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-0504,DFN-CERT-2022-2306,WID-SEC-2022-1776",""
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.21 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.806855,"CVE-2016-0594",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c0e714a3-311e-4d60-82d9-649f6b6484bc,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.21.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.21 Security Update (cpujan2016) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.806855)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.16 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to an information disclosure vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.40
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.118384,"CVE-2022-21589",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1db0ae7f-7dec-4257-847a-d253933e269d,"","Update to version 5.7.40, 8.0.17 or later.","Oracle MySQL Server version 5.7.39 and prior and 8.0 through
8.0.16.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.16 Security Update (cpuoct2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.118384)
Version used: 2023-10-19T13:05:21+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-2306,WID-SEC-2023-2031,WID-SEC-2022-1776",""
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.29 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to an information disclosure vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.40
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.118386,"CVE-2022-21592",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,09a54547-805f-453c-bad5-6262933f3566,"","Update to version 5.7.40, 8.0.30 or later.","Oracle MySQL Server version 5.7.39 and prior and 8.0 through
8.0.29.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.29 Security Update (cpuoct2022) -...
(OID: 1.3.6.1.4.1.25623.1.0.118386)
Version used: 2023-10-19T13:05:21+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2022-2306,WID-SEC-2023-2031,WID-SEC-2022-1776",""
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Jul 2015)","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805930,"CVE-2015-4737,CVE-2015-2620",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8b11c21f-0b88-49bb-a8e9-e81ebe051449,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.43 and earlier
and 5.6.23 and earlier on Windows","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server : Pluggable Auth and
Server : Security : Privileges.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Jul 2015)
(OID: 1.3.6.1.4.1.25623.1.0.805930)
Version used: 2024-02-20T13:05:48+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1604,DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1096,DFN-CERT-2015-1071,CB-K15/1518,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1020",""
192.168.8.111,,443,tcp,4.3,Medium,98,"Mitigation","SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection","It was possible to detect the usage of the deprecated TLSv1.0
and/or TLSv1.1 protocol on this system.","In addition to TLSv1.2+ the service is also providing the deprecated TLSv1.0 and TLSv1.1 protocols and supports one or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.802067) VT.
",1.3.6.1.4.1.25623.1.0.117274,"CVE-2011-3389,CVE-2015-0204",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1417983f-7e71-46f8-881e-ae9e9e9d690d,"An attacker might be able to use the known cryptographic flaws
to eavesdrop the connection between clients and the service to get access to sensitive data
transferred within the secured connection.

Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.","It is recommended to disable the deprecated TLSv1.0 and/or
TLSv1.1 protocols in favor of the TLSv1.2+ protocols. Please see the references for more
information.","All services providing an encrypted communication using the
TLSv1.0 and/or TLSv1.1 protocols.","The TLSv1.0 and TLSv1.1 protocols contain known cryptographic
flaws like:

- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)

- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded Legacy
Encryption (FREAK)","Check the used TLS protocols of the services provided by this
system.
Details:
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
(OID: 1.3.6.1.4.1.25623.1.0.117274)
Version used: 2023-10-21T00:09:12+08:00
","","","DFN-CERT-2020-0177,DFN-CERT-2020-0111,DFN-CERT-2019-0068,DFN-CERT-2018-1441,DFN-CERT-2018-1408,DFN-CERT-2016-1372,DFN-CERT-2016-1164,DFN-CERT-2016-0388,DFN-CERT-2015-1853,DFN-CERT-2015-1332,DFN-CERT-2015-0884,DFN-CERT-2015-0800,DFN-CERT-2015-0758,DFN-CERT-2015-0567,DFN-CERT-2015-0544,DFN-CERT-2015-0530,DFN-CERT-2015-0396,DFN-CERT-2015-0375,DFN-CERT-2015-0374,DFN-CERT-2015-0305,DFN-CERT-2015-0199,DFN-CERT-2015-0079,DFN-CERT-2015-0021,DFN-CERT-2014-1414,DFN-CERT-2013-1847,DFN-CERT-2013-1792,DFN-CERT-2012-1979,DFN-CERT-2012-1829,DFN-CERT-2012-1530,DFN-CERT-2012-1380,DFN-CERT-2012-1377,DFN-CERT-2012-1292,DFN-CERT-2012-1214,DFN-CERT-2012-1213,DFN-CERT-2012-1180,DFN-CERT-2012-1156,DFN-CERT-2012-1155,DFN-CERT-2012-1039,DFN-CERT-2012-0956,DFN-CERT-2012-0908,DFN-CERT-2012-0868,DFN-CERT-2012-0867,DFN-CERT-2012-0848,DFN-CERT-2012-0838,DFN-CERT-2012-0776,DFN-CERT-2012-0722,DFN-CERT-2012-0638,DFN-CERT-2012-0627,DFN-CERT-2012-0451,DFN-CERT-2012-0418,DFN-CERT-2012-0354,DFN-CERT-2012-0234,DFN-CERT-2012-0221,DFN-CERT-2012-0177,DFN-CERT-2012-0170,DFN-CERT-2012-0146,DFN-CERT-2012-0142,DFN-CERT-2012-0126,DFN-CERT-2012-0123,DFN-CERT-2012-0095,DFN-CERT-2012-0051,DFN-CERT-2012-0047,DFN-CERT-2012-0021,DFN-CERT-2011-1953,DFN-CERT-2011-1946,DFN-CERT-2011-1844,DFN-CERT-2011-1826,DFN-CERT-2011-1774,DFN-CERT-2011-1743,DFN-CERT-2011-1738,DFN-CERT-2011-1706,DFN-CERT-2011-1628,DFN-CERT-2011-1627,DFN-CERT-2011-1619,DFN-CERT-2011-1482,WID-SEC-2023-1435,CB-K18/0799,CB-K16/1289,CB-K16/1096,CB-K15/1751,CB-K15/1266,CB-K15/0850,CB-K15/0764,CB-K15/0720,CB-K15/0548,CB-K15/0526,CB-K15/0509,CB-K15/0493,CB-K15/0384,CB-K15/0365,CB-K15/0364,CB-K15/0302,CB-K15/0192,CB-K15/0079,CB-K15/0016,CB-K14/1342,CB-K14/0231,CB-K13/0845,CB-K13/0796,CB-K13/0790",""
192.168.8.111,,8445,tcp,4.3,Medium,98,"Mitigation","SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection","It was possible to detect the usage of the deprecated TLSv1.0
and/or TLSv1.1 protocol on this system.","In addition to TLSv1.2+ the service is also providing the deprecated TLSv1.0 and TLSv1.1 protocols and supports one or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.802067) VT.
",1.3.6.1.4.1.25623.1.0.117274,"CVE-2011-3389,CVE-2015-0204",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f9aa6866-9fa1-4d6b-8719-0212d887398c,"An attacker might be able to use the known cryptographic flaws
to eavesdrop the connection between clients and the service to get access to sensitive data
transferred within the secured connection.

Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.","It is recommended to disable the deprecated TLSv1.0 and/or
TLSv1.1 protocols in favor of the TLSv1.2+ protocols. Please see the references for more
information.","All services providing an encrypted communication using the
TLSv1.0 and/or TLSv1.1 protocols.","The TLSv1.0 and TLSv1.1 protocols contain known cryptographic
flaws like:

- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)

- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded Legacy
Encryption (FREAK)","Check the used TLS protocols of the services provided by this
system.
Details:
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
(OID: 1.3.6.1.4.1.25623.1.0.117274)
Version used: 2023-10-21T00:09:12+08:00
","","","DFN-CERT-2020-0177,DFN-CERT-2020-0111,DFN-CERT-2019-0068,DFN-CERT-2018-1441,DFN-CERT-2018-1408,DFN-CERT-2016-1372,DFN-CERT-2016-1164,DFN-CERT-2016-0388,DFN-CERT-2015-1853,DFN-CERT-2015-1332,DFN-CERT-2015-0884,DFN-CERT-2015-0800,DFN-CERT-2015-0758,DFN-CERT-2015-0567,DFN-CERT-2015-0544,DFN-CERT-2015-0530,DFN-CERT-2015-0396,DFN-CERT-2015-0375,DFN-CERT-2015-0374,DFN-CERT-2015-0305,DFN-CERT-2015-0199,DFN-CERT-2015-0079,DFN-CERT-2015-0021,DFN-CERT-2014-1414,DFN-CERT-2013-1847,DFN-CERT-2013-1792,DFN-CERT-2012-1979,DFN-CERT-2012-1829,DFN-CERT-2012-1530,DFN-CERT-2012-1380,DFN-CERT-2012-1377,DFN-CERT-2012-1292,DFN-CERT-2012-1214,DFN-CERT-2012-1213,DFN-CERT-2012-1180,DFN-CERT-2012-1156,DFN-CERT-2012-1155,DFN-CERT-2012-1039,DFN-CERT-2012-0956,DFN-CERT-2012-0908,DFN-CERT-2012-0868,DFN-CERT-2012-0867,DFN-CERT-2012-0848,DFN-CERT-2012-0838,DFN-CERT-2012-0776,DFN-CERT-2012-0722,DFN-CERT-2012-0638,DFN-CERT-2012-0627,DFN-CERT-2012-0451,DFN-CERT-2012-0418,DFN-CERT-2012-0354,DFN-CERT-2012-0234,DFN-CERT-2012-0221,DFN-CERT-2012-0177,DFN-CERT-2012-0170,DFN-CERT-2012-0146,DFN-CERT-2012-0142,DFN-CERT-2012-0126,DFN-CERT-2012-0123,DFN-CERT-2012-0095,DFN-CERT-2012-0051,DFN-CERT-2012-0047,DFN-CERT-2012-0021,DFN-CERT-2011-1953,DFN-CERT-2011-1946,DFN-CERT-2011-1844,DFN-CERT-2011-1826,DFN-CERT-2011-1774,DFN-CERT-2011-1743,DFN-CERT-2011-1738,DFN-CERT-2011-1706,DFN-CERT-2011-1628,DFN-CERT-2011-1627,DFN-CERT-2011-1619,DFN-CERT-2011-1482,WID-SEC-2023-1435,CB-K18/0799,CB-K16/1289,CB-K16/1096,CB-K15/1751,CB-K15/1266,CB-K15/0850,CB-K15/0764,CB-K15/0720,CB-K15/0548,CB-K15/0526,CB-K15/0509,CB-K15/0493,CB-K15/0384,CB-K15/0365,CB-K15/0364,CB-K15/0302,CB-K15/0192,CB-K15/0079,CB-K15/0016,CB-K14/1342,CB-K14/0231,CB-K13/0845,CB-K13/0796,CB-K13/0790",""
192.168.8.85,yilan950502.tahoho.com.tw,3389,tcp,4.3,Medium,98,"Mitigation","SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection","It was possible to detect the usage of the deprecated TLSv1.0
and/or TLSv1.1 protocol on this system.","In addition to TLSv1.2+ the service is also providing the deprecated TLSv1.0 and TLSv1.1 protocols and supports one or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.802067) VT.
",1.3.6.1.4.1.25623.1.0.117274,"CVE-2011-3389,CVE-2015-0204",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,93466b06-39e2-4b96-93b8-478a1b3df512,"An attacker might be able to use the known cryptographic flaws
to eavesdrop the connection between clients and the service to get access to sensitive data
transferred within the secured connection.

Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
anymore.","It is recommended to disable the deprecated TLSv1.0 and/or
TLSv1.1 protocols in favor of the TLSv1.2+ protocols. Please see the references for more
information.","All services providing an encrypted communication using the
TLSv1.0 and/or TLSv1.1 protocols.","The TLSv1.0 and TLSv1.1 protocols contain known cryptographic
flaws like:

- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)

- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded Legacy
Encryption (FREAK)","Check the used TLS protocols of the services provided by this
system.
Details:
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
(OID: 1.3.6.1.4.1.25623.1.0.117274)
Version used: 2023-10-21T00:09:12+08:00
","","","DFN-CERT-2020-0177,DFN-CERT-2020-0111,DFN-CERT-2019-0068,DFN-CERT-2018-1441,DFN-CERT-2018-1408,DFN-CERT-2016-1372,DFN-CERT-2016-1164,DFN-CERT-2016-0388,DFN-CERT-2015-1853,DFN-CERT-2015-1332,DFN-CERT-2015-0884,DFN-CERT-2015-0800,DFN-CERT-2015-0758,DFN-CERT-2015-0567,DFN-CERT-2015-0544,DFN-CERT-2015-0530,DFN-CERT-2015-0396,DFN-CERT-2015-0375,DFN-CERT-2015-0374,DFN-CERT-2015-0305,DFN-CERT-2015-0199,DFN-CERT-2015-0079,DFN-CERT-2015-0021,DFN-CERT-2014-1414,DFN-CERT-2013-1847,DFN-CERT-2013-1792,DFN-CERT-2012-1979,DFN-CERT-2012-1829,DFN-CERT-2012-1530,DFN-CERT-2012-1380,DFN-CERT-2012-1377,DFN-CERT-2012-1292,DFN-CERT-2012-1214,DFN-CERT-2012-1213,DFN-CERT-2012-1180,DFN-CERT-2012-1156,DFN-CERT-2012-1155,DFN-CERT-2012-1039,DFN-CERT-2012-0956,DFN-CERT-2012-0908,DFN-CERT-2012-0868,DFN-CERT-2012-0867,DFN-CERT-2012-0848,DFN-CERT-2012-0838,DFN-CERT-2012-0776,DFN-CERT-2012-0722,DFN-CERT-2012-0638,DFN-CERT-2012-0627,DFN-CERT-2012-0451,DFN-CERT-2012-0418,DFN-CERT-2012-0354,DFN-CERT-2012-0234,DFN-CERT-2012-0221,DFN-CERT-2012-0177,DFN-CERT-2012-0170,DFN-CERT-2012-0146,DFN-CERT-2012-0142,DFN-CERT-2012-0126,DFN-CERT-2012-0123,DFN-CERT-2012-0095,DFN-CERT-2012-0051,DFN-CERT-2012-0047,DFN-CERT-2012-0021,DFN-CERT-2011-1953,DFN-CERT-2011-1946,DFN-CERT-2011-1844,DFN-CERT-2011-1826,DFN-CERT-2011-1774,DFN-CERT-2011-1743,DFN-CERT-2011-1738,DFN-CERT-2011-1706,DFN-CERT-2011-1628,DFN-CERT-2011-1627,DFN-CERT-2011-1619,DFN-CERT-2011-1482,WID-SEC-2023-1435,CB-K18/0799,CB-K16/1289,CB-K16/1096,CB-K15/1751,CB-K15/1266,CB-K15/0850,CB-K15/0764,CB-K15/0720,CB-K15/0548,CB-K15/0526,CB-K15/0509,CB-K15/0493,CB-K15/0384,CB-K15/0365,CB-K15/0364,CB-K15/0302,CB-K15/0192,CB-K15/0079,CB-K15/0016,CB-K14/1342,CB-K14/0231,CB-K13/0845,CB-K13/0796,CB-K13/0790",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 03 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804074,"CVE-2013-5891",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ff29fb62-c034-4bd5-97d8-b6fc894aebcb,"Successful exploitation will allow attackers to manipulate certain data and
cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.33 and earlier on Windows,
Oracle MySQL version 5.6.13 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Partition.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 03 (Jan 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804074)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0187,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: 5.6.11
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809815,"CVE-2013-2376,CVE-2013-1511",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9586bf95-951e-43d0-b92a-8fe855ec05bc,"Successful exploitation could allow remote attackers to affect
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.5.31, 5.6.11 or later.","Oracle MySQL Server versions 5.5 through 5.5.30 and 5.6 through 5.6.10.","Unspecified error in some unknown vectors related to Stored Procedure.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr201...
(OID: 1.3.6.1.4.1.25623.1.0.809815)
Version used: 2022-04-25T22:50:49+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-0882,DFN-CERT-2013-0798",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-04 (Feb 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805135,"CVE-2015-0391",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,32c40f42-94df-4475-8db5-c38e47ca1f15,"Successful exploitation will allow attackers
to disclose potentially sensitive information, manipulate certain data,
cause a DoS (Denial of Service), and compromise a vulnerable system.","Apply the patch from the referenced advisory.","Oracle MySQL Server version 5.5.38 and
earlier, and 5.6.19 and earlier on Windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to DLL.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-04 (Feb 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805135)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1264,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2015-0074,CB-K15/1193,CB-K15/0567,CB-K15/0415,CB-K15/0073",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-05 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805174,"CVE-2015-2566,CVE-2015-0439,CVE-2015-0438,CVE-2015-0423,CVE-2015-0405",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0c672588-3690-4471-af1b-d7328ec28873,"Successful exploitation will allow an
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.22 and earlier
on windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to DML, Server : InnoDB,
Server : Partition, Optimizer, XA.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-05 (Apr 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805174)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1623,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/0720,CB-K15/0531",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-04 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805173,"CVE-2015-2567,CVE-2015-0511,CVE-2015-0508,CVE-2015-0507,CVE-2015-0506,CVE-2015-0503,CVE-2015-0500,CVE-2015-0498",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fb443af6-19cc-41ea-af63-6aa7d72d9af2,"Successful exploitation will allow an
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.23 and earlier
on windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to Server : Security : Privileges,
Server : SP, Server : InnoDB, Server : Memcached, InnoDB, Server : Partition,
Replication and some unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-04 (Apr 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805173)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1623,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/0720,CB-K15/0531",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-03 (Feb 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805134,"CVE-2015-0409,CVE-2015-0385",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a02e9d0c-8b9d-45bb-889c-247f34c0353f,"Successful exploitation will allow attackers
to disclose potentially sensitive information, manipulate certain data,
cause a DoS (Denial of Service), and compromise a vulnerable system.","Apply the patch from the referenced advisory.","Oracle MySQL Server version 5.6.21 and
earlier on Windows.","Unspecified errors in the MySQL Server
component via unknown vectors related to Optimizer and Pluggable Auth.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-03 (Feb 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805134)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-0427,DFN-CERT-2015-0074,CB-K15/0415,CB-K15/0073",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-01 (Oct 2013) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch from the referenced advisory.

",1.3.6.1.4.1.25623.1.0.804032,"CVE-2013-5767,CVE-2013-5786,CVE-2013-5793",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f91a3930-10e0-41a1-8a77-ba9f117a42c8,"Successful exploitation will allow remote attackers to disclose sensitive
information, manipulate certain data, cause a DoS (Denial of Service) and
bypass certain security restrictions.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.12 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Optimizer and InnoDB.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities-01 (Oct 2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804032)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-1795,CB-K13/0789",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 05 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804076,"CVE-2014-0386,CVE-2014-0393,CVE-2014-0402",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0b37e24a-cfde-4755-8097-024d6d30f626,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13
and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Optimizer, InnoDB, and Locking.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 05 (Jan 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804076)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0180,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0187,CB-K14/0177,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 04 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804075,"CVE-2014-0401,CVE-2014-0412,CVE-2014-0437,CVE-2013-5908",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,71dd4a84-b632-4ede-96bd-12a69d2bb990,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14
and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to InnoDB, Optimizer, Error Handling, and some unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 04 (Jan 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804075)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1604,DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0180,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K15/1518,CB-K14/0710,CB-K14/0187,CB-K14/0177,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 04 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Vulnerable range: 5.6 - 5.6.16

",1.3.6.1.4.1.25623.1.0.804577,"CVE-2014-2435",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f0e03416-c9dd-442a-a6ff-f7637b4d9c0c,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.16 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to InnoDB.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 04 (May 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804577)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0452",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 01 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804574,"CVE-2014-0384,CVE-2014-2419,CVE-2014-2438",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,2e650e46-e571-4794-8d82-a7585ff5f0fb,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.35 and earlier and 5.6.15 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Partition, Replication and XML subcomponent.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 01 (May 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804574)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0477,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0464,CB-K14/0452",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-05 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.805768,"CVE-2015-4910,CVE-2015-4890,CVE-2015-4862,CVE-2015-4800,CVE-2015-4791",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c680aae1-08be-4d84-9e34-3a8570e86d3d,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality, integrity, and
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.26 and earlier
on windows","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-05 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805768)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0695,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K16/0646,CB-K16/0245,CB-K15/1844,CB-K15/1554",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.805766,"CVE-2015-4904,CVE-2015-4895,CVE-2015-4833,CVE-2015-4766",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,bce27723-e396-4a32-bc53-81e270ed8ae8,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality, integrity, and
availability via unknown vectors and a local attacker to affect availability
via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server Server 5.6.25 and
earlier on windows","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805766)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0845,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1692,DFN-CERT-2015-1638,CB-K16/0791,CB-K16/0246,CB-K16/0245,CB-K15/1844,CB-K15/1600,CB-K15/1554",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server Component Optimizer Unspecified vulnerability (Oct 2013) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804033,"CVE-2013-3839",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f748903b-6cff-4248-bb29-9bf28fd17069,"Successful exploitation will allow remote attackers to disclose sensitive
information, manipulate certain data, cause a DoS (Denial of Service) and
bypass certain security restrictions.","Apply the patch from the referenced advisory.","Oracle MySQL versions 5.1.51 through 5.1.70, 5.5.10 through 5.5.32, and 5.6.x
through 5.6.12 on Windows.","Unspecified error in the MySQL Server component via unknown vectors related
to Optimizer.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server Component 'Optimizer' Unspecified vulnerability (Oct 201...
(OID: 1.3.6.1.4.1.25623.1.0.804033)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0190,DFN-CERT-2013-2099,DFN-CERT-2013-1846,DFN-CERT-2013-1815,DFN-CERT-2013-1795,CB-K14/0187,CB-K13/1072,CB-K13/0840,CB-K13/0806,CB-K13/0789",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-05 (Jul 2015)","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10

",1.3.6.1.4.1.25623.1.0.805932,"CVE-2015-4756",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,dcc091ca-3ed4-4dc5-8d51-72c25267361c,"Successful exploitation will allow an
authenticated remote attacker to cause denial of service attack.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.22 and earlier on Windows.","Unspecified error exists in the MySQL Server
component via unknown vectors related to Server : InnoDB.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Unspecified Vulnerability-05 (Jul 2015)
(OID: 1.3.6.1.4.1.25623.1.0.805932)
Version used: 2024-02-20T13:05:48+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1071,CB-K15/1020",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-04 (Oct 2015) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.805767,"CVE-2015-4730",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e8cd992a-dfb8-45d5-bee7-5f4a9ac58fff,"Successful exploitation will allow an
authenticated remote attacker to affect availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.20 and earlier on
windows","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Unspecified Vulnerability-04 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805767)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K15/1844,CB-K15/1554",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch

",1.3.6.1.4.1.25623.1.0.805765,"CVE-2015-4905,CVE-2015-4866",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a4dd0274-ae04-4f59-bbfb-70c31415951a,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality, integrity, and
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.23 and earlier on
windows","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805765)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K16/0245,CB-K15/1844,CB-K15/1554",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Jul 2015)","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805929,"CVE-2015-2648,CVE-2015-4752,CVE-2015-2643,CVE-2015-2582",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e6db673e-a99f-42c2-a485-6998af1b527b,"Successful exploitation will allow an
authenticated remote attacker to cause denial-of-service attack.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.43 and earlier, and
5.6.24 and earlier on Windows.","Unspecified errors exist in the MySQL Server
component via unknown vectors related to DML, Server : I_S, Server : Optimizer,
and GIS.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Jul 2015)
(OID: 1.3.6.1.4.1.25623.1.0.805929)
Version used: 2024-02-20T13:05:48+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1096,DFN-CERT-2015-1071,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1020",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805764,"CVE-2015-4913,CVE-2015-4830,CVE-2015-4826,CVE-2015-4815,CVE-2015-4807,CVE-2015-4802,CVE-2015-4792,CVE-2015-4870,CVE-2015-4861,CVE-2015-4858,CVE-2015-4836",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,aa51f723-bbca-4616-9c98-09e07d2abc98,"Successful exploitation will allow an
authenticated remote attacker to affect confidentiality, integrity, and
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.45 and earlier
and 5.6.26 and earlier on windows","Unspecified errors exist in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805764)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1692,DFN-CERT-2015-1638,CB-K16/1122,CB-K16/0791,CB-K16/0646,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K15/1844,CB-K15/1600,CB-K15/1554",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","MySQL Unspecified vulnerability-04 (Jul 2013) - Windows","MySQL is prone to an unspecified vulnerability.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803726,"CVE-2013-3808",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d553ebcd-93d7-4f99-aa7c-5d0b3a862bb3,"Successful exploitation will allow remote authenticated users to affect
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier and 5.6.10 on Windows.","Unspecified error in the MySQL Server component via unknown vectors related
to Server Options.","Checks if a vulnerable version is present on the target host.
Details:
MySQL Unspecified vulnerability-04 (Jul 2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.803726)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/0620",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-02 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803724,"CVE-2013-3812,CVE-2013-3809,CVE-2013-3793",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7ec778f2-48ef-41c2-8024-ebee1d8eeb76,"Successful exploitation will allow remote authenticated users to affect
integrity and availability via unknown vectors and cause denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL 5.5.31 and earlier, 5.6.11 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Server Replication, Audit Log and Data Manipulation Language.","Checks if a vulnerable version is present on the target host.
Details:
MySQL Unspecified vulnerabilities-02 (Jul 2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.803724)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-2099,DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/1072,CB-K13/0620",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-01 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803723,"CVE-2013-3804,CVE-2013-3802",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,5774f521-4119-4f6d-91ba-3214b3fcdb1d,"Successful exploitation will allow remote authenticated users to affect
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, 5.6.11 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Full Text Search and Server Optimizer.","Checks if a vulnerable version is present on the target host.
Details:
MySQL Unspecified vulnerabilities-01 (Jul 2013) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.803723)
Version used: 2024-02-20T22:37:13+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2013-2099,DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/1072,CB-K13/0620",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.117192,"CVE-2016-0595,CVE-2016-0610",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c24d97b2-aa1b-4a12-9eac-1e873818fc6a,"Successful exploitation will allow an authenticated remote attacker
to affect availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.27.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.117192)
Version used: 2021-02-12T19:09:59+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0791,CB-K16/0646,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.806877,"CVE-2016-0596",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b58ea688-b9b1-4664-b6fe-7c5287918d21,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.46 and prior and 5.6 through 5.6.27.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 Security Update (cpujan2016) -...
(OID: 1.3.6.1.4.1.25623.1.0.806877)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0143,DFN-CERT-2016-0104,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0646,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K16/0133,CB-K16/0094",""
192.168.8.77,,3306,tcp,3.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.808593,"CVE-2016-5444",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,26e6ba40-c1d6-4098-8084-ad227d674c59,"Successful exploitation will allow a remote attacker to affect
confidentiality via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.11.","An unspecified error exists in the 'MySQL Server' component via
unknown vectors related to 'Connection' sub-component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.808593)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1122,CB-K16/1100",""
192.168.8.77,,3306,tcp,3.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.10 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.808594,"CVE-2016-3452",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,5fe475c0-b2b3-413a-823b-4d283bcd177a,"Successful exploitation will allow a remote attacker to affect
confidentiality via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.10.","An unspecified error exists in the 'MySQL Server' component via
unknown vectors related to the 'Security Encryption' sub-component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.10 Security Updat...
(OID: 1.3.6.1.4.1.25623.1.0.808594)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1122,CB-K16/1100",""
192.168.8.77,,3306,tcp,3.5,Low,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-07 (Oct 2015) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805770,"CVE-2015-4864",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0a7914b2-f8ff-48b9-a57b-44f1f22164e7,"Successful exploitation will allow an
authenticated remote attacker to affect integrity via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.43 and earlier,
and 5.6.24 and earlier on windows","Unspecified error exists in the MySQL Server
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified Vulnerabilities-07 (Oct 2015) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.805770)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K16/0245,CB-K15/1844,CB-K15/1554",""
192.168.8.77,,3306,tcp,3.5,Low,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-04 (Jul 2015)","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: Apply the patch
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.805931,"CVE-2015-4757",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6bb81d42-53f7-44fd-9a6c-89b4258aada1,"Successful exploitation will allow an
authenticated remote attacker to cause denial of service attack.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.42 and earlier,
and 5.6.23 and earlier on Windows.","Unspecified error exists in the MySQL Server
component via unknown vectors related to Server : Optimizer.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Unspecified Vulnerability-04 (Jul 2015)
(OID: 1.3.6.1.4.1.25623.1.0.805931)
Version used: 2024-02-20T13:05:48+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1096,DFN-CERT-2015-1071,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1020",""
192.168.8.77,,3306,tcp,3.1,Low,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.809388,"CVE-2016-8288",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d24e3870-c51a-4ba6-9b54-368c2f81750f,"Successful exploitation of this vulnerability will allow a remote
authenticated user to partially modify data.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.30 and 5.7 through 5.7.12.","The flaw exists due to an unspecified vulnerability within the
'Server: InnoDB' component.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpuoct201...
(OID: 1.3.6.1.4.1.25623.1.0.809388)
Version used: 2021-10-13T19:01:26+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1624",""
192.168.8.77,,3306,tcp,2.8,Low,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 06 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804077,"CVE-2014-0420",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,90c95b10-3289-4b35-98f6-7925c2b5fa04,"Successful exploitation will allow attackers to manipulate certain data
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.34 and earlier, and 5.6.14 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
to Replication.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Multiple Unspecified vulnerabilities - 06 (Jan 2014) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.804077)
Version used: 2024-02-09T13:06:25+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0187,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
192.168.8.77,,3306,tcp,2.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.18 Security Update (cpujul2019) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: 5.6.45
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.142643,"CVE-2019-2730",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,03cdf567-3bce-4d07-b06f-8ffa1b1daaef,"","Update to version 5.6.45, 5.7.19 or later.","Oracle MySQL Server versions 5.6.44 and prior and 5.7 through 5.7.18.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.18 Security Update (cpujul2019) -...
(OID: 1.3.6.1.4.1.25623.1.0.142643)
Version used: 2021-09-07T22:01:38+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2019-2169,DFN-CERT-2019-1453,CB-K19/0620",""
192.168.8.77,,3306,tcp,2.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
vulnerability.","Installed version: 5.6.10
Fixed version: 5.7.41
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.149532,"CVE-2023-21963",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6c167597-b869-4816-80c6-8f10a92b93f5,"","Update to version 5.7.41, 8.0.32 or later.","Oracle MySQL Server version 5.7.40 and prior and 8.x through
8.0.31.","","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpuapr2023) - ...
(OID: 1.3.6.1.4.1.25623.1.0.149532)
Version used: 2023-10-13T13:06:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2023-0885,WID-SEC-2023-1033",""
192.168.8.73,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776100354
Packet 2: 776100468
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,98995537-312f-4cb9-868e-8a3acbf9eff2,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.74,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776100550
Packet 2: 776100660
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4dd06049-3613-4300-baba-5412a79bbacd,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.232,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776037987
Packet 2: 776038100
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,739c92ed-11e2-43c3-8726-025c05a84aa4,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.72,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776038273
Packet 2: 776038388
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1794b668-7d42-47f5-b4d6-052cb059ab0a,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.85,yilan950502.tahoho.com.tw,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 580440354
Packet 2: 580441503
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,272fb516-5abc-4c17-819c-514e68a627e6,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.61,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776066889
Packet 2: 776067002
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9d370575-eca2-4761-ad4d-b6d05076c99d,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.157,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776066986
Packet 2: 776067100
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,77f27061-9c10-4820-a486-450c5c45d198,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.81,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776068577
Packet 2: 776068689
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,de48b858-9ebb-4db6-bc94-f737fd2e5986,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.111,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 3466672361
Packet 2: 3466673515
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,bd8d4a9d-e591-464e-9105-2448dcfad365,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.75,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776096810
Packet 2: 776096924
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f332cb75-ff52-4975-b03d-08d52e228aa8,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.62,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776102987
Packet 2: 776103103
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,173b63a4-a762-4607-a72d-053c62b4d781,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.230,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776118898
Packet 2: 776119012
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,78a308b8-acca-4428-a9f9-6680d19ecb78,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.70,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.

The following timestamps were retrieved with a delay of 1 seconds in-between:
Packet 1: 776159214
Packet 2: 776159328
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,948c5fb2-356f-4b98-bab2-66bf599305a8,"A side effect of this feature is that the uptime of the remote
host can sometimes be computed.","To disable TCP timestamps on linux add the line
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
runtime.

To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'

Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.

The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
them in their synchronize (SYN) segment.

See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
are reported.
Details:
TCP Timestamps Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.80091)
Version used: 2023-12-16T00:10:08+08:00
","","","",""
192.168.8.74,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,53864daf-1811-4d36-a017-ebd14c50fb63,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.72,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ce4300a-6b11-4c3d-a2a8-2039f647c988,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.77,,3306,tcp,2.1,Low,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
Fixed version: See the referenced vendor advisory
Installation
path / port: 3306/tcp

",1.3.6.1.4.1.25623.1.0.806875,"CVE-2016-0605",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e5b3240a-44f1-41e4-bcde-1f6db858ced3,"Successful exploitation will allow an authenticated remote attacker
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.26.","Unspecified errors exist in the 'MySQL Server' component via
unknown vectors.","Checks if a vulnerable version is present on the target host.
Details:
Oracle MySQL Server 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows
(OID: 1.3.6.1.4.1.25623.1.0.806875)
Version used: 2022-04-13T21:17:10+08:00
","Product: cpe:/a:mysql:mysql:5.6.10
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
(OID: 1.3.6.1.4.1.25623.1.0.100152)
","","DFN-CERT-2016-0695,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0646,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
192.168.8.75,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,53693730-ff23-4e7b-936c-f19180aabe7c,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.157,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,91632323-c5ef-4826-bc16-1a16928a666e,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.232,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,90979c61-45d9-4630-af96-f217001484b5,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.70,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b37af213-e512-40d3-94a3-1d0047ce61ff,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.61,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e91537e7-0a62-4e4b-a0ba-cd6a50f64108,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.111,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,aa2837fb-580e-40a2-b191-1e1b7dd7f154,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.77,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ba39a39-869c-4e9e-9a1b-689103bf7aed,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
192.168.8.73,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
- ICMP Type: 14
- ICMP Code: 0
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f6f479e8-514c-47f8-a595-d838cb2efc52,"This information could theoretically be used to exploit weak
time-based random number generators in other services.","Various mitigations are possible:

- Disable the support for ICMP timestamp on the remote host completely

- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
Timestamp Reply (Type 14) is received.
Details:
ICMP Timestamp Reply Information Disclosure
(OID: 1.3.6.1.4.1.25623.1.0.103190)
Version used: 2023-05-11T17:09:33+08:00
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
(2-2/2)