|
IP,Hostname,Port,Port Protocol,CVSS,Severity,QoD,Solution Type,NVT Name,Summary,Specific Result,NVT OID,CVEs,Task ID,Task Name,Timestamp,Result ID,Impact,Solution,Affected Software/OS,Vulnerability Insight,Vulnerability Detection Method,Product Detection Result,BIDs,CERTs,Other References
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle Mysql Security Update (cpuoct2018 - 02) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See reference
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.814258,"CVE-2018-3133,CVE-2018-3174,CVE-2018-3282,CVE-2016-9843,CVE-2016-9840,CVE-2016-9841,CVE-2016-9842",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e88e455b-531a-4e82-bfdd-605c012ca0bd,"Successful exploitation will allow remote
|
|
attackers to have an impact on confidentiality, integrity and availability.","The vendor has released updates. Please see the references for
|
|
more information.","Oracle MySQL version 5.5.x through 5.5.61,
|
|
5.6.x through 5.6.41, 5.7.x through 5.7.23 and 8.0.x through 8.0.12.","Multiple flaws exist due to:
|
|
|
|
- An unspecified error within 'InnoDB (zlib)' component of MySQL Server.
|
|
|
|
- An unspecified error within 'Server: Parser' component of MySQL Server.
|
|
|
|
- An unspecified error within 'Client programs' component of MySQL Server.
|
|
|
|
- An unspecified error within 'Server: Storage Engines' component of MySQL Server.","Checks if a vulnerable version is present
|
|
on the target host.
|
|
Details:
|
|
Oracle Mysql Security Update (cpuoct2018 - 02) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.814258)
|
|
Version used: 2022-06-24T17:38:38+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0998,DFN-CERT-2020-1536,DFN-CERT-2019-1614,DFN-CERT-2019-1588,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0592,DFN-CERT-2019-0484,DFN-CERT-2019-0463,DFN-CERT-2019-0112,DFN-CERT-2018-2435,DFN-CERT-2018-2273,DFN-CERT-2018-2110,DFN-CERT-2018-1408,DFN-CERT-2018-0659,DFN-CERT-2018-0645,DFN-CERT-2018-0039,DFN-CERT-2017-2300,DFN-CERT-2017-2268,DFN-CERT-2017-1825,DFN-CERT-2017-1785,DFN-CERT-2017-1692,DFN-CERT-2017-1655,DFN-CERT-2017-1097,DFN-CERT-2017-0904,DFN-CERT-2017-0806,DFN-CERT-2016-2109,WID-SEC-2024-1232,WID-SEC-2023-1594,WID-SEC-2022-0673,CB-K22/0045,CB-K20/0714,CB-K18/1005,CB-K18/0799,CB-K18/0030,CB-K17/2199,CB-K17/2168,CB-K17/1745,CB-K17/1709,CB-K17/1622,CB-K17/1585,CB-K17/1062,CB-K17/0877,CB-K17/0784,CB-K16/1996",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.35 / 8.0 <= 8.0.26 Security Update (cpuoct2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.36
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117741,"CVE-2021-3711,CVE-2021-22926,CVE-2021-35604,CVE-2021-35624,CVE-2021-22922,CVE-2021-22923,CVE-2021-22924,CVE-2021-22925,CVE-2021-22945,CVE-2021-22946,CVE-2021-22947,CVE-2021-3712",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fa9eb0d7-fb83-4b71-94b2-2ba00c5d48e8,"","Update to version 5.7.36, 8.0.27 or later.","Oracle MySQL Server version 5.7.35 and prior and 8.0 through 8.0.26.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.35 / 8.0 <= 8.0.26 Security Update (cpuoct2021) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117741)
|
|
Version used: 2021-10-23T16:58:44+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0573,DFN-CERT-2024-0147,DFN-CERT-2023-0469,DFN-CERT-2022-2825,DFN-CERT-2022-2376,DFN-CERT-2022-2350,DFN-CERT-2022-2086,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-2047,DFN-CERT-2022-1892,DFN-CERT-2022-1692,DFN-CERT-2022-1597,DFN-CERT-2022-1582,DFN-CERT-2022-1571,DFN-CERT-2022-1469,DFN-CERT-2022-1386,DFN-CERT-2022-1241,DFN-CERT-2022-1215,DFN-CERT-2022-1143,DFN-CERT-2022-0933,DFN-CERT-2022-0922,DFN-CERT-2022-0867,DFN-CERT-2022-0835,DFN-CERT-2022-0666,DFN-CERT-2022-0586,DFN-CERT-2022-0437,DFN-CERT-2022-0369,DFN-CERT-2022-0122,DFN-CERT-2022-0120,DFN-CERT-2022-0118,DFN-CERT-2022-0112,DFN-CERT-2022-0076,DFN-CERT-2022-0052,DFN-CERT-2022-0031,DFN-CERT-2021-2527,DFN-CERT-2021-2502,DFN-CERT-2021-2481,DFN-CERT-2021-2438,DFN-CERT-2021-2434,DFN-CERT-2021-2403,DFN-CERT-2021-2394,DFN-CERT-2021-2369,DFN-CERT-2021-2329,DFN-CERT-2021-2223,DFN-CERT-2021-2216,DFN-CERT-2021-2214,DFN-CERT-2021-2189,DFN-CERT-2021-2188,DFN-CERT-2021-2185,DFN-CERT-2021-2167,DFN-CERT-2021-1996,DFN-CERT-2021-1931,DFN-CERT-2021-1917,DFN-CERT-2021-1915,DFN-CERT-2021-1871,DFN-CERT-2021-1803,DFN-CERT-2021-1799,DFN-CERT-2021-1743,DFN-CERT-2021-1593,DFN-CERT-2021-1580,DFN-CERT-2021-1568,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2024-0556,WID-SEC-2023-2229,WID-SEC-2023-1821,WID-SEC-2023-1350,WID-SEC-2023-1030,WID-SEC-2023-0530,WID-SEC-2022-2354,WID-SEC-2022-2000,WID-SEC-2022-1908,WID-SEC-2022-1894,WID-SEC-2022-1515,WID-SEC-2022-1461,WID-SEC-2022-1335,WID-SEC-2022-1308,WID-SEC-2022-1228,WID-SEC-2022-1225,WID-SEC-2022-1056,WID-SEC-2022-0875,WID-SEC-2022-0874,WID-SEC-2022-0751,WID-SEC-2022-0676,WID-SEC-2022-0673,WID-SEC-2022-0602,WID-SEC-2022-0530,WID-SEC-2022-0432,WID-SEC-2022-0400,WID-SEC-2022-0393,WID-SEC-2022-0302,WID-SEC-2022-0101,WID-SEC-2022-0094,CB-K22/0473,CB-K22/0469,CB-K22/0316,CB-K22/0224,CB-K22/0077,CB-K22/0072,CB-K22/0062,CB-K22/0045,CB-K22/0030,CB-K22/0011,CB-K21/1268,CB-K21/1179,CB-K21/1161,CB-K21/1087,CB-K21/0994,CB-K21/0991,CB-K21/0969,CB-K21/0907,CB-K21/0897,CB-K21/0797",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.807927,"CVE-2016-0655,CVE-2016-0639,CVE-2016-0705,CVE-2015-3197,CVE-2016-0702,CVE-2016-0797,CVE-2016-0798,CVE-2016-0799,CVE-2016-0800",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ea420eb-42a4-4a3f-9714-fe73391068f4,"Successful exploitation will allow an authenticated remote attacker to
|
|
affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.29 and 5.7 through 5.7.11.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpuapr201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.807927)
|
|
Version used: 2021-10-13T19:01:26+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-0228,DFN-CERT-2018-2564,DFN-CERT-2018-1929,DFN-CERT-2018-1907,DFN-CERT-2018-1675,DFN-CERT-2018-1048,DFN-CERT-2018-1036,DFN-CERT-2018-0952,DFN-CERT-2018-0620,DFN-CERT-2018-0512,DFN-CERT-2018-0096,DFN-CERT-2017-0947,DFN-CERT-2017-0797,DFN-CERT-2016-2081,DFN-CERT-2016-1778,DFN-CERT-2016-1713,DFN-CERT-2016-1401,DFN-CERT-2016-1389,DFN-CERT-2016-1216,DFN-CERT-2016-1175,DFN-CERT-2016-1174,DFN-CERT-2016-1168,DFN-CERT-2016-1103,DFN-CERT-2016-1026,DFN-CERT-2016-0994,DFN-CERT-2016-0951,DFN-CERT-2016-0903,DFN-CERT-2016-0890,DFN-CERT-2016-0845,DFN-CERT-2016-0841,DFN-CERT-2016-0815,DFN-CERT-2016-0803,DFN-CERT-2016-0789,DFN-CERT-2016-0765,DFN-CERT-2016-0699,DFN-CERT-2016-0698,DFN-CERT-2016-0695,DFN-CERT-2016-0647,DFN-CERT-2016-0644,DFN-CERT-2016-0638,DFN-CERT-2016-0499,DFN-CERT-2016-0496,DFN-CERT-2016-0495,DFN-CERT-2016-0465,DFN-CERT-2016-0459,DFN-CERT-2016-0453,DFN-CERT-2016-0451,DFN-CERT-2016-0415,DFN-CERT-2016-0403,DFN-CERT-2016-0388,DFN-CERT-2016-0360,DFN-CERT-2016-0359,DFN-CERT-2016-0357,DFN-CERT-2016-0166,WID-SEC-2023-1956,WID-SEC-2023-1594,WID-SEC-2023-0427,CB-K19/0354,CB-K18/0482,CB-K18/0094,CB-K17/0917,CB-K17/0772,CB-K16/1972,CB-K16/1678,CB-K16/1617,CB-K16/1315,CB-K16/1305,CB-K16/1141,CB-K16/1107,CB-K16/1103,CB-K16/1102,CB-K16/1097,CB-K16/1038,CB-K16/0955,CB-K16/0936,CB-K16/0894,CB-K16/0792,CB-K16/0791,CB-K16/0763,CB-K16/0750,CB-K16/0736,CB-K16/0716,CB-K16/0651,CB-K16/0650,CB-K16/0646,CB-K16/0600,CB-K16/0598,CB-K16/0597,CB-K16/0459,CB-K16/0457,CB-K16/0456,CB-K16/0433,CB-K16/0424,CB-K16/0415,CB-K16/0413,CB-K16/0374,CB-K16/0367,CB-K16/0331,CB-K16/0329,CB-K16/0328,CB-K16/0146",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.38 / 8.0 <= 8.0.29 Security Update (cpujul2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.39
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.148511,"CVE-2022-1292,CVE-2022-27778,CVE-2018-25032,CVE-2022-21515",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,2298cd52-2b43-42ab-a2fb-1a724165daf1,"","Update to version 5.7.39, 8.0.30 or later.","Oracle MySQL Server version 5.7.38 and prior and 8.0 through
|
|
8.0.29.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.38 / 8.0 <= 8.0.29 Security Update (cpujul2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.148511)
|
|
Version used: 2022-07-22T18:11:18+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0998,DFN-CERT-2024-0790,DFN-CERT-2024-0147,DFN-CERT-2023-3028,DFN-CERT-2023-2667,DFN-CERT-2023-2600,DFN-CERT-2023-2599,DFN-CERT-2023-2571,DFN-CERT-2023-0553,DFN-CERT-2023-0430,DFN-CERT-2023-0372,DFN-CERT-2023-0121,DFN-CERT-2023-0119,DFN-CERT-2023-0100,DFN-CERT-2022-2799,DFN-CERT-2022-2668,DFN-CERT-2022-2376,DFN-CERT-2022-2323,DFN-CERT-2022-2309,DFN-CERT-2022-2305,DFN-CERT-2022-2268,DFN-CERT-2022-2254,DFN-CERT-2022-2150,DFN-CERT-2022-2111,DFN-CERT-2022-2094,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-2066,DFN-CERT-2022-2059,DFN-CERT-2022-2047,DFN-CERT-2022-1992,DFN-CERT-2022-1905,DFN-CERT-2022-1875,DFN-CERT-2022-1837,DFN-CERT-2022-1646,DFN-CERT-2022-1614,DFN-CERT-2022-1609,DFN-CERT-2022-1520,DFN-CERT-2022-1476,DFN-CERT-2022-1425,DFN-CERT-2022-1310,DFN-CERT-2022-1304,DFN-CERT-2022-1267,DFN-CERT-2022-1264,DFN-CERT-2022-1116,DFN-CERT-2022-1115,DFN-CERT-2022-1114,DFN-CERT-2022-1103,DFN-CERT-2022-1081,DFN-CERT-2022-1076,DFN-CERT-2022-1054,DFN-CERT-2022-1049,DFN-CERT-2022-0986,DFN-CERT-2022-0768,DFN-CERT-2022-0716,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2023-2723,WID-SEC-2023-2229,WID-SEC-2023-1969,WID-SEC-2023-1784,WID-SEC-2023-1542,WID-SEC-2023-1432,WID-SEC-2023-1424,WID-SEC-2023-1350,WID-SEC-2023-1021,WID-SEC-2023-0141,WID-SEC-2023-0132,WID-SEC-2022-1775,WID-SEC-2022-1772,WID-SEC-2022-1767,WID-SEC-2022-1461,WID-SEC-2022-1438,WID-SEC-2022-1335,WID-SEC-2022-1245,WID-SEC-2022-1228,WID-SEC-2022-1068,WID-SEC-2022-1057,WID-SEC-2022-0833,WID-SEC-2022-0826,WID-SEC-2022-0767,WID-SEC-2022-0755,WID-SEC-2022-0736,WID-SEC-2022-0735,WID-SEC-2022-0677,WID-SEC-2022-0554,WID-SEC-2022-0393,WID-SEC-2022-0277,WID-SEC-2022-0071,WID-SEC-2022-0005,CB-K22/0619,CB-K22/0570,CB-K22/0536,CB-K22/0386",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.5.52 / 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809386,"CVE-2016-5584,CVE-2016-6662,CVE-2016-7440",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8286c2d2-60df-4195-bd77-51588593964a,"Successful exploitation of this vulnerability will allow a remote
|
|
user to access restricted data.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.52 and prior, 5.6 through 5.6.33 and 5.7 through 5.7.15.","Multiple flaws exist due to multiple unspecified errors in the
|
|
'Server: Security: Encryption' and 'Server: Logging' components.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.52 / 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809386)
|
|
Version used: 2021-10-13T19:01:26+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-1473,DFN-CERT-2017-0138,DFN-CERT-2017-0060,DFN-CERT-2016-1950,DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1790,DFN-CERT-2016-1753,DFN-CERT-2016-1714,DFN-CERT-2016-1540,DFN-CERT-2016-1479,CB-K17/0139,CB-K17/0055,CB-K16/1846,CB-K16/1755,CB-K16/1742,CB-K16/1714,CB-K16/1655,CB-K16/1624,CB-K16/1448,CB-K16/1392",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.31 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to a vulnerability in InnoDB
|
|
(zlib).","Installed version: 5.6.10
|
|
Fixed version: 5.7.42
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149536,"CVE-2022-37434",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,285c784f-e8ce-4f6b-9b0f-9854920f1bca,"","Update to version 5.7.42, 8.0.32 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
|
|
8.0.31.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.31 Security Update (cpuapr2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149536)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0998,DFN-CERT-2024-0790,DFN-CERT-2024-0125,DFN-CERT-2023-3028,DFN-CERT-2023-2816,DFN-CERT-2023-2799,DFN-CERT-2023-1643,DFN-CERT-2023-0885,DFN-CERT-2023-0881,DFN-CERT-2023-0553,DFN-CERT-2023-0122,DFN-CERT-2023-0119,DFN-CERT-2023-0105,DFN-CERT-2022-2799,DFN-CERT-2022-2421,DFN-CERT-2022-2415,DFN-CERT-2022-2366,DFN-CERT-2022-2365,DFN-CERT-2022-2364,DFN-CERT-2022-2363,DFN-CERT-2022-2323,DFN-CERT-2022-1841,DFN-CERT-2022-1710,WID-SEC-2024-0794,WID-SEC-2024-0122,WID-SEC-2024-0120,WID-SEC-2024-0064,WID-SEC-2023-2031,WID-SEC-2023-1812,WID-SEC-2023-1791,WID-SEC-2023-1790,WID-SEC-2023-1783,WID-SEC-2023-1728,WID-SEC-2023-1542,WID-SEC-2023-1350,WID-SEC-2023-1033,WID-SEC-2023-1031,WID-SEC-2023-1021,WID-SEC-2023-1016,WID-SEC-2023-0140,WID-SEC-2023-0137,WID-SEC-2023-0132,WID-SEC-2023-0126,WID-SEC-2023-0125,WID-SEC-2022-1888,WID-SEC-2022-1438,WID-SEC-2022-0929",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpujan2023) - Windows","Oracle MySQL Server is prone to a vulnerability in libcurl.","Installed version: 5.6.10
|
|
Fixed version: 5.7.41
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149170,"CVE-2022-32221,CVE-2022-35260,CVE-2022-42915,CVE-2022-42916",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a0b87069-4cf9-4632-8b27-c00eb1750e35,"","Update to version 5.7.41, 8.0.32 or later.","Oracle MySQL Server version 5.7.40 and prior and 8.0 through
|
|
8.0.31.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpujan2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149170)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-1947,DFN-CERT-2023-1636,DFN-CERT-2023-1230,DFN-CERT-2023-0898,DFN-CERT-2023-0884,DFN-CERT-2023-0372,DFN-CERT-2023-0278,DFN-CERT-2023-0216,DFN-CERT-2023-0214,DFN-CERT-2023-0157,DFN-CERT-2023-0156,DFN-CERT-2023-0105,DFN-CERT-2022-2799,DFN-CERT-2022-2401,DFN-CERT-2022-2400,DFN-CERT-2022-2393,DFN-CERT-2022-2391,WID-SEC-2024-0794,WID-SEC-2023-2917,WID-SEC-2023-2229,WID-SEC-2023-2031,WID-SEC-2023-1728,WID-SEC-2023-1614,WID-SEC-2023-1424,WID-SEC-2023-1350,WID-SEC-2023-1026,WID-SEC-2023-0296,WID-SEC-2023-0189,WID-SEC-2023-0137,WID-SEC-2023-0126,WID-SEC-2022-2372,WID-SEC-2022-1862",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809376,"CVE-2016-6304,CVE-2016-2177,CVE-2016-2178,CVE-2016-2179,CVE-2016-2180,CVE-2016-2181,CVE-2016-2182,CVE-2016-2183,CVE-2016-6302,CVE-2016-6303,CVE-2016-6306",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7567dddd-f3a7-4188-b75b-ae15c7276675,"Successful exploitation of this vulnerability will allow remote
|
|
attackers to cause a denial of service (memory consumption).","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.33 and 5.7 through 5.7.15.","The flaw exists due to improper validation of large OCSP Status
|
|
Request extensions.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.33 / 5.7 <= 5.7.15 Security Update (cpuoct201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809376)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-1618,DFN-CERT-2021-0775,DFN-CERT-2021-0770,DFN-CERT-2021-0274,DFN-CERT-2020-2141,DFN-CERT-2020-0368,DFN-CERT-2019-1455,DFN-CERT-2019-0068,DFN-CERT-2018-1377,DFN-CERT-2018-1296,DFN-CERT-2018-0323,DFN-CERT-2018-0100,DFN-CERT-2017-2070,DFN-CERT-2017-1954,DFN-CERT-2017-1831,DFN-CERT-2017-1821,DFN-CERT-2017-1785,DFN-CERT-2017-1626,DFN-CERT-2017-1485,DFN-CERT-2017-1326,DFN-CERT-2017-1239,DFN-CERT-2017-1238,DFN-CERT-2017-1124,DFN-CERT-2017-0988,DFN-CERT-2017-0968,DFN-CERT-2017-0947,DFN-CERT-2017-0946,DFN-CERT-2017-0904,DFN-CERT-2017-0816,DFN-CERT-2017-0746,DFN-CERT-2017-0677,DFN-CERT-2017-0675,DFN-CERT-2017-0611,DFN-CERT-2017-0609,DFN-CERT-2017-0522,DFN-CERT-2017-0519,DFN-CERT-2017-0482,DFN-CERT-2017-0402,DFN-CERT-2017-0394,DFN-CERT-2017-0351,DFN-CERT-2017-0178,DFN-CERT-2017-0154,DFN-CERT-2017-0093,DFN-CERT-2017-0090,DFN-CERT-2017-0089,DFN-CERT-2017-0088,DFN-CERT-2017-0086,DFN-CERT-2016-2081,DFN-CERT-2016-2063,DFN-CERT-2016-1943,DFN-CERT-2016-1937,DFN-CERT-2016-1898,DFN-CERT-2016-1859,DFN-CERT-2016-1734,DFN-CERT-2016-1732,DFN-CERT-2016-1726,DFN-CERT-2016-1717,DFN-CERT-2016-1715,DFN-CERT-2016-1714,DFN-CERT-2016-1588,DFN-CERT-2016-1555,DFN-CERT-2016-1391,DFN-CERT-2016-1136,WID-SEC-2024-1277,WID-SEC-2024-0214,WID-SEC-2024-0213,WID-SEC-2024-0212,WID-SEC-2024-0211,WID-SEC-2024-0210,WID-SEC-2024-0209,WID-SEC-2024-0064,WID-SEC-2022-1955,CB-K21/1094,CB-K20/1023,CB-K20/0321,CB-K20/0314,CB-K20/0157,CB-K19/0618,CB-K19/0615,CB-K18/0296,CB-K18/0098,CB-K17/1980,CB-K17/1871,CB-K17/1753,CB-K17/1750,CB-K17/1709,CB-K17/1558,CB-K17/1423,CB-K17/1273,CB-K17/1202,CB-K17/1196,CB-K17/1092,CB-K17/0955,CB-K17/0939,CB-K17/0917,CB-K17/0915,CB-K17/0877,CB-K17/0796,CB-K17/0724,CB-K17/0661,CB-K17/0657,CB-K17/0582,CB-K17/0581,CB-K17/0506,CB-K17/0504,CB-K17/0467,CB-K17/0394,CB-K17/0391,CB-K17/0345,CB-K17/0175,CB-K17/0149,CB-K17/0098,CB-K17/0097,CB-K17/0089,CB-K17/0086,CB-K17/0082,CB-K16/1972,CB-K16/1958,CB-K16/1837,CB-K16/1830,CB-K16/1784,CB-K16/1755,CB-K16/1638,CB-K16/1635,CB-K16/1630,CB-K16/1624,CB-K16/1622,CB-K16/1620,CB-K16/1500,CB-K16/1465,CB-K16/1307,CB-K16/1066",""
|
|
192.168.8.77,,3306,tcp,9.8,High,80,"VendorFix","Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.34, 8.1.0 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.44
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.151218,"CVE-2023-38545,CVE-2023-22084,CVE-2023-38546",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,875b89c7-f0b9-4764-ad6f-df54d23a1d3e,"","Update to version 5.7.44, 8.0.35, 8.1.1 or later.","Oracle MySQL Server version 5.7.43 and prior, 8.x through
|
|
8.0.34 and 8.1.0.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.34, 8.1.0 Security Update (cpuoct2...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.151218)
|
|
Version used: 2023-10-28T00:11:33+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-1601,DFN-CERT-2024-1517,DFN-CERT-2024-1188,DFN-CERT-2024-1090,DFN-CERT-2024-1025,DFN-CERT-2024-0963,DFN-CERT-2024-0869,DFN-CERT-2024-0593,DFN-CERT-2024-0454,DFN-CERT-2024-0376,DFN-CERT-2024-0220,DFN-CERT-2024-0185,DFN-CERT-2024-0184,DFN-CERT-2024-0181,DFN-CERT-2024-0133,DFN-CERT-2024-0132,DFN-CERT-2024-0127,DFN-CERT-2024-0108,DFN-CERT-2023-3124,DFN-CERT-2023-3071,DFN-CERT-2023-3064,DFN-CERT-2023-2988,DFN-CERT-2023-2941,DFN-CERT-2023-2819,DFN-CERT-2023-2763,DFN-CERT-2023-2681,DFN-CERT-2023-2680,DFN-CERT-2023-2643,DFN-CERT-2023-2536,DFN-CERT-2023-2475,DFN-CERT-2023-2458,WID-SEC-2024-1226,WID-SEC-2024-1086,WID-SEC-2024-0893,WID-SEC-2024-0290,WID-SEC-2024-0178,WID-SEC-2024-0175,WID-SEC-2024-0123,WID-SEC-2024-0119,WID-SEC-2024-0110,WID-SEC-2023-2788,WID-SEC-2023-2690,WID-SEC-2023-2570",""
|
|
192.168.8.77,,3306,tcp,8.1,High,80,"VendorFix","Oracle MySQL Server <= 5.7.34 / 8.0 <= 8.0.25 Security Update (cpujul2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.35
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.146355,"CVE-2021-22901,CVE-2019-17543,CVE-2021-2389,CVE-2021-2390,CVE-2021-2356,CVE-2021-2385,CVE-2021-2342,CVE-2021-2372,CVE-2021-22897,CVE-2021-22898",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b6a9ab5e-1afe-45ac-b5af-532446522473,"","Update to version 5.7.35, 8.0.26 or later.","Oracle MySQL Server version 5.7.34 and prior and 8.0 through 8.0.25.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.34 / 8.0 <= 8.0.25 Security Update (cpujul2021) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.146355)
|
|
Version used: 2023-10-21T00:09:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-1892,DFN-CERT-2022-1692,DFN-CERT-2022-1597,DFN-CERT-2022-1241,DFN-CERT-2022-0933,DFN-CERT-2022-0872,DFN-CERT-2022-0666,DFN-CERT-2022-0076,DFN-CERT-2022-0074,DFN-CERT-2021-2527,DFN-CERT-2021-2438,DFN-CERT-2021-2369,DFN-CERT-2021-2185,DFN-CERT-2021-2155,DFN-CERT-2021-1743,DFN-CERT-2021-1677,DFN-CERT-2021-1593,DFN-CERT-2021-1580,DFN-CERT-2021-1537,DFN-CERT-2021-1329,DFN-CERT-2021-1174,DFN-CERT-2021-1165,DFN-CERT-2021-1157,DFN-CERT-2021-1151,DFN-CERT-2021-1148,DFN-CERT-2021-1045,DFN-CERT-2019-2216,WID-SEC-2023-2229,WID-SEC-2023-1350,WID-SEC-2023-0063,WID-SEC-2022-1963,WID-SEC-2022-0873,CB-K22/0044,CB-K21/0813,CB-K21/0770",""
|
|
192.168.8.77,,3306,tcp,8.1,High,80,"VendorFix","Oracle MySQL Server <= 5.5.49 / 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808588,"CVE-2016-3477,CVE-2016-3521,CVE-2016-3615,CVE-2016-5440",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ba6c3ead-1a97-402c-88c6-c2f0449e16f5,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.49 and prior, 5.6 through 5.6.30 and 5.7 through 5.7.12.","Multiple unspecified errors exist in the 'MySQL Server' component
|
|
via unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.49 / 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808588)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1540,DFN-CERT-2016-1217,DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1755,CB-K16/1742,CB-K16/1448,CB-K16/1146,CB-K16/1122,CB-K16/1100",""
|
|
192.168.8.77,,3306,tcp,7.7,High,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.810882,"CVE-2017-3309,CVE-2017-3308,CVE-2017-3329,CVE-2017-3456,CVE-2017-3453,CVE-2017-3600,CVE-2017-3462,CVE-2017-3463,CVE-2017-3461,CVE-2017-3464",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,3e2306f4-584c-4222-96e3-95db50916105,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to have impact on availability, confidentiality
|
|
and integrity.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.54 and earlier,
|
|
5.6.35 and earlier, 5.7.17 and earlier on Windows","Multiple flaws exist due to multiple
|
|
unspecified errors in the 'Server: DML', 'Server: Optimizer',
|
|
'Server: Thread Pooling', 'Client mysqldump', 'Server: Security: Privileges'
|
|
components of the application.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2017-3236618) 02 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.810882)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1630,DFN-CERT-2017-1465,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-0959,DFN-CERT-2017-0675,CB-K18/0224,CB-K17/1732,CB-K17/1604,CB-K17/1563,CB-K17/1401,CB-K17/1298,CB-K17/1239,CB-K17/0927,CB-K17/0657",""
|
|
192.168.8.77,,3306,tcp,7.7,High,80,"VendorFix","Oracle Mysql Security Updates (apr2018-3678067) 04 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.813148,"CVE-2018-2761,CVE-2018-2771,CVE-2018-2781,CVE-2018-2773,CVE-2018-2817,CVE-2018-2813,CVE-2018-2755,CVE-2018-2819,CVE-2018-2818",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8f187bcc-3e27-4fe6-9813-294f6cd781b5,"Successful exploitation of this
|
|
vulnerability will allow remote attackers to have an impact on confidentiality,
|
|
integrity and availability.","Apply the latest patch from vendor. Please see the references for more information.","Oracle MySQL version 5.5.59 and earlier,
|
|
5.6.39 and earlier, 5.7.21 and earlier on Windows","Multiple flaws exist due to
|
|
|
|
- Multiple errors in the 'Client programs' component of MySQL Server.
|
|
|
|
- An error in the 'Server: Locking' component of MySQL Server.
|
|
|
|
- An error in the 'Server: Optimizer' component of MySQL Server.
|
|
|
|
- Multiple errors in the 'Server: DDL' component of MySQL Server.
|
|
|
|
- Multiple errors in the 'Server: Replication' component of MySQL Server.
|
|
|
|
- An error in the 'InnoDB' component of MySQL Server.
|
|
|
|
- An error in the 'Server : Security : Privileges' component of MySQL Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2018-3678067) 04 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.813148)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0913,DFN-CERT-2018-0723,WID-SEC-2023-1594,CB-K18/0608",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Denial Of Service Vulnerability (Feb 2017) - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.21
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.810603,"CVE-2017-3302",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7f5fe926-2c03-4637-93ea-a6ff66ff13cd,"Successful exploitation of this vulnerability
|
|
will allow attackers to cause crash of applications using that MySQL client.","Upgrade to Oracle MySQL version 5.6.21 or
|
|
5.7.5 or later.","Oracle MySQL version before 5.6.21 and
|
|
5.7.x before 5.7.5 on Windows","Multiple errors exist as,
|
|
|
|
- In sql-common/client.c script 'mysql_prune_stmt_list' function, the for loop
|
|
adds elements to pruned_list without removing it from the existing list.
|
|
|
|
- If application gets disconnected just before it tries to prepare a new
|
|
statement, 'mysql_prune_stmt_list' tries to detach all previously prepared
|
|
statements.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Denial Of Service Vulnerability (Feb 2017) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.810603)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1675,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-0675,DFN-CERT-2017-0430,CB-K18/0224,CB-K17/1604,CB-K17/1298,CB-K17/1239,CB-K17/0657,CB-K17/0423",""
|
|
192.168.8.111,,445,tcp,7.5,High,99,"WillNotFix","Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerability","Microsoft Windows is prone to an authentication bypass
|
|
vulnerability via SMB/NETBIOS.","It was possible to login at the share 'IPC$' with an empty login and password.
|
|
",1.3.6.1.4.1.25623.1.0.801991,"CVE-1999-0519",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,bdec3ed4-0c30-481e-a99d-74b71b4a49a4,"Successful exploitation could allow attackers to use shares to
|
|
cause the system to crash.","No known solution was made available for at least one year
|
|
since the disclosure of this vulnerability. Likely none will be provided anymore.
|
|
General solution options are to upgrade to a newer release, disable respective
|
|
features, remove the product or replace the product by another one.
|
|
|
|
A workaround is to,
|
|
|
|
- Disable null session login.
|
|
|
|
- Remove the share.
|
|
|
|
- Enable passwords on the share.","'- Microsoft Windows 95
|
|
|
|
- Microsoft Windows 98
|
|
|
|
- Microsoft Windows NT
|
|
|
|
- Microsoft Windows 2000
|
|
|
|
- Microsoft Windows in other implementations / versions might be affected as well","The flaw is due to an SMB share, allows full access to Guest users.
|
|
If the Guest account is enabled, anyone can access the computer without a valid user account or password.","
|
|
Details:
|
|
Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass Vulnerabili...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.801991)
|
|
Version used: 2023-07-28T13:05:23+08:00
|
|
","","","",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 01 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.810880,"CVE-2017-3302",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,49769af1-68d6-4454-b3ab-e378ba90e30a,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to cause the affected application to crash,
|
|
resulting in a denial-of-service condition.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.54 and earlier,
|
|
5.6.20 and earlier on Windows","The flaw exists due to some unspecified error
|
|
in the 'Server: C API' component due to failure to handle exceptional
|
|
conditions.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2017-3236618) 01 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.810880)
|
|
Version used: 2023-07-15T00:09:27+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1675,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-0675,DFN-CERT-2017-0430,CB-K18/0224,CB-K17/1604,CB-K17/1298,CB-K17/1239,CB-K17/0657,CB-K17/0423",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808591,"CVE-2016-3471",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d85c19db-78f2-4591-85de-d642639db38f,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.45 and prior and 5.6 through 5.6.26.","An unspecified error exists in the 'MySQL Server' component via
|
|
unknown vectors related to the 'Option' sub-component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujul2016) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808591)
|
|
Version used: 2022-07-07T18:16:06+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1122,CB-K16/1100",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 03 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.812648,"CVE-2018-2573,CVE-2017-3737,CVE-2018-2696,CVE-2018-2590,CVE-2018-2583,CVE-2018-2612,CVE-2018-2645,CVE-2018-2703,CVE-2018-2647",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,568ecc92-9bd1-4ea9-b609-d6484b4effff,"Successful exploitation of these vulnerabilities
|
|
will allow remote attackers to conduct a denial-of-service condition, access and
|
|
modify data.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.38 and earlier,
|
|
5.7.20 and earlier on Windows","Multiple flaws exist due to
|
|
|
|
- Multiple errors in the 'Server:Security:Privileges' component.
|
|
|
|
- Multiple errors in the 'Server:Performance Schema' component.
|
|
|
|
- An error in the 'Server:Replication' component.
|
|
|
|
- An error in the 'Server:Packaging(OpenSSL)' component.
|
|
|
|
- An error in the 'Server:GIS' component.
|
|
|
|
- An error in the 'InnoDB' component.
|
|
|
|
- An error in the 'Stored Procedure' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jan2018-3236628) 03 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.812648)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1402,DFN-CERT-2018-1377,DFN-CERT-2018-1364,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-1068,DFN-CERT-2018-0759,DFN-CERT-2018-0736,DFN-CERT-2018-0733,DFN-CERT-2018-0729,DFN-CERT-2018-0725,DFN-CERT-2018-0723,DFN-CERT-2018-0696,DFN-CERT-2018-0673,DFN-CERT-2018-0536,DFN-CERT-2018-0515,DFN-CERT-2018-0424,DFN-CERT-2018-0318,DFN-CERT-2018-0212,DFN-CERT-2018-0101,DFN-CERT-2018-0064,DFN-CERT-2017-2216,WID-SEC-2024-0205,WID-SEC-2023-1594,WID-SEC-2022-0673,CB-K22/0045,CB-K18/0813,CB-K18/0808,CB-K18/0608,CB-K18/0607,CB-K18/0606,CB-K18/0605,CB-K18/0495,CB-K18/0480,CB-K18/0392,CB-K18/0301,CB-K18/0195,CB-K18/0096,CB-K18/0057,CB-K17/2122",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.43
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.151214,"CVE-2023-2650,CVE-2023-0464,CVE-2023-0465,CVE-2023-0466,CVE-2023-1255",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9acbed75-8ba9-4852-af26-a19e227ee52d,"","Update to version 5.7.43, 8.0.34 or later.","Oracle MySQL Server version 5.7.42 and prior and 8.x through
|
|
8.0.33.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpuoct2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.151214)
|
|
Version used: 2023-10-20T13:06:03+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-1067,DFN-CERT-2024-0565,DFN-CERT-2024-0147,DFN-CERT-2024-0125,DFN-CERT-2023-3071,DFN-CERT-2023-3070,DFN-CERT-2023-2749,DFN-CERT-2023-2545,DFN-CERT-2023-2536,DFN-CERT-2023-2116,DFN-CERT-2023-1947,DFN-CERT-2023-1903,DFN-CERT-2023-1720,DFN-CERT-2023-1649,DFN-CERT-2023-1642,DFN-CERT-2023-1462,DFN-CERT-2023-1428,DFN-CERT-2023-1423,DFN-CERT-2023-1332,DFN-CERT-2023-1246,DFN-CERT-2023-1245,DFN-CERT-2023-1233,DFN-CERT-2023-0999,DFN-CERT-2023-0960,DFN-CERT-2023-0929,DFN-CERT-2023-0904,DFN-CERT-2023-0782,DFN-CERT-2023-0700,DFN-CERT-2023-0645,WID-SEC-2024-0794,WID-SEC-2024-0120,WID-SEC-2024-0064,WID-SEC-2024-0053,WID-SEC-2023-2917,WID-SEC-2023-2690,WID-SEC-2023-2674,WID-SEC-2023-1794,WID-SEC-2023-1781,WID-SEC-2023-1614,WID-SEC-2023-1432,WID-SEC-2023-1323,WID-SEC-2023-1130,WID-SEC-2023-1053,WID-SEC-2023-0782,WID-SEC-2023-0732",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.807923,"CVE-2016-0668,CVE-2016-0665,CVE-2016-0661,CVE-2015-3194,CVE-2015-3195",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4ffd43a4-f5a1-4824-9822-bbc4f843e1db,"Successful exploitation will allow local users to affect availability
|
|
via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.28 and 5.7 through 5.7.10.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update (cpuapr201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.807923)
|
|
Version used: 2022-08-19T18:10:35+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1929,DFN-CERT-2018-0096,DFN-CERT-2017-0947,DFN-CERT-2016-2081,DFN-CERT-2016-1778,DFN-CERT-2016-1692,DFN-CERT-2016-1174,DFN-CERT-2016-1026,DFN-CERT-2016-0994,DFN-CERT-2016-0903,DFN-CERT-2016-0890,DFN-CERT-2016-0845,DFN-CERT-2016-0803,DFN-CERT-2016-0797,DFN-CERT-2016-0789,DFN-CERT-2016-0695,DFN-CERT-2016-0647,DFN-CERT-2016-0644,DFN-CERT-2016-0638,DFN-CERT-2016-0610,DFN-CERT-2016-0484,DFN-CERT-2016-0465,DFN-CERT-2016-0403,DFN-CERT-2016-0388,DFN-CERT-2016-0170,DFN-CERT-2015-1971,DFN-CERT-2015-1916,DFN-CERT-2015-1867,CB-K18/0094,CB-K17/0917,CB-K16/1972,CB-K16/1678,CB-K16/1593,CB-K16/1107,CB-K16/0955,CB-K16/0936,CB-K16/0791,CB-K16/0750,CB-K16/0747,CB-K16/0736,CB-K16/0646,CB-K16/0600,CB-K16/0598,CB-K16/0597,CB-K16/0562,CB-K16/0446,CB-K16/0433,CB-K16/0367,CB-K16/0158,CB-K15/1865,CB-K15/1815,CB-K15/1768",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.42
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149538,"CVE-2023-0215,CVE-2022-43551,CVE-2023-21980,CVE-2022-4304,CVE-2022-4450,CVE-2023-0286",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ae6c669-4ee8-4f1d-b23c-f01dfbcce2f7,"","Update to version 5.7.42, 8.0.33 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
|
|
8.0.32.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpuapr2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149538)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-1188,DFN-CERT-2024-0593,DFN-CERT-2024-0454,DFN-CERT-2024-0147,DFN-CERT-2024-0126,DFN-CERT-2024-0016,DFN-CERT-2023-2192,DFN-CERT-2023-1760,DFN-CERT-2023-1697,DFN-CERT-2023-1656,DFN-CERT-2023-1643,DFN-CERT-2023-1590,DFN-CERT-2023-1522,DFN-CERT-2023-1462,DFN-CERT-2023-1423,DFN-CERT-2023-1297,DFN-CERT-2023-1256,DFN-CERT-2023-1162,DFN-CERT-2023-1043,DFN-CERT-2023-1037,DFN-CERT-2023-0898,DFN-CERT-2023-0885,DFN-CERT-2023-0884,DFN-CERT-2023-0881,DFN-CERT-2023-0774,DFN-CERT-2023-0685,DFN-CERT-2023-0662,DFN-CERT-2023-0661,DFN-CERT-2023-0639,DFN-CERT-2023-0618,DFN-CERT-2023-0543,DFN-CERT-2023-0471,DFN-CERT-2023-0430,DFN-CERT-2023-0329,DFN-CERT-2023-0318,DFN-CERT-2023-0310,DFN-CERT-2023-0299,DFN-CERT-2023-0288,DFN-CERT-2023-0284,DFN-CERT-2023-0283,DFN-CERT-2022-2902,WID-SEC-2024-0794,WID-SEC-2024-0114,WID-SEC-2024-0064,WID-SEC-2023-2229,WID-SEC-2023-2031,WID-SEC-2023-1886,WID-SEC-2023-1812,WID-SEC-2023-1793,WID-SEC-2023-1790,WID-SEC-2023-1614,WID-SEC-2023-1553,WID-SEC-2023-1432,WID-SEC-2023-1424,WID-SEC-2023-1350,WID-SEC-2023-1033,WID-SEC-2023-1016,WID-SEC-2023-0777,WID-SEC-2023-0304,WID-SEC-2022-2375",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.33 / 8.0 <= 8.0.23 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.34
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145796,"CVE-2021-3449,CVE-2021-3450,CVE-2021-23840,CVE-2021-23841,CVE-2021-2307,CVE-2021-2304,CVE-2021-2180,CVE-2021-2194,CVE-2021-2166,CVE-2021-2179,CVE-2021-2226,CVE-2021-2169,CVE-2021-2146,CVE-2021-2174,CVE-2021-2171,CVE-2021-2162",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a4356c35-b4d3-401e-9456-9436982cfd3d,"","Update to version 5.7.34, 8.0.24 or later.","Oracle MySQL Server version 5.7.33 and prior and 8.0 through 8.0.23.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.33 / 8.0 <= 8.0.23 Security Update (cpuapr2021) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145796)
|
|
Version used: 2023-10-21T00:09:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-1582,DFN-CERT-2022-1571,DFN-CERT-2022-1241,DFN-CERT-2022-1215,DFN-CERT-2022-0933,DFN-CERT-2022-0666,DFN-CERT-2022-0121,DFN-CERT-2022-0076,DFN-CERT-2022-0024,DFN-CERT-2021-2527,DFN-CERT-2021-2394,DFN-CERT-2021-2223,DFN-CERT-2021-2216,DFN-CERT-2021-2214,DFN-CERT-2021-2197,DFN-CERT-2021-2196,DFN-CERT-2021-2190,DFN-CERT-2021-2155,DFN-CERT-2021-2126,DFN-CERT-2021-1996,DFN-CERT-2021-1825,DFN-CERT-2021-1803,DFN-CERT-2021-1740,DFN-CERT-2021-1670,DFN-CERT-2021-1660,DFN-CERT-2021-1549,DFN-CERT-2021-1547,DFN-CERT-2021-1537,DFN-CERT-2021-1500,DFN-CERT-2021-1418,DFN-CERT-2021-1330,DFN-CERT-2021-1132,DFN-CERT-2021-1129,DFN-CERT-2021-1128,DFN-CERT-2021-1098,DFN-CERT-2021-1070,DFN-CERT-2021-1061,DFN-CERT-2021-0984,DFN-CERT-2021-0884,DFN-CERT-2021-0862,DFN-CERT-2021-0829,DFN-CERT-2021-0821,DFN-CERT-2021-0818,DFN-CERT-2021-0813,DFN-CERT-2021-0807,DFN-CERT-2021-0806,DFN-CERT-2021-0740,DFN-CERT-2021-0696,DFN-CERT-2021-0656,DFN-CERT-2021-0630,DFN-CERT-2021-0629,DFN-CERT-2021-0409,DFN-CERT-2021-0408,DFN-CERT-2021-0379,DFN-CERT-2021-0363,WID-SEC-2024-0794,WID-SEC-2023-0065,WID-SEC-2022-1894,WID-SEC-2022-1320,WID-SEC-2022-1303,WID-SEC-2022-1294,WID-SEC-2022-0751,WID-SEC-2022-0676,WID-SEC-2022-0671,WID-SEC-2022-0669,WID-SEC-2022-0602,CB-K22/0476,CB-K22/0061,CB-K21/1097,CB-K21/1095,CB-K21/1065,CB-K21/0785,CB-K21/0770,CB-K21/0573,CB-K21/0572,CB-K21/0565,CB-K21/0421,CB-K21/0412,CB-K21/0409,CB-K21/0389,CB-K21/0317,CB-K21/0185",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.5.39 / 5.6 <= 5.6.20 Security Update (cpuoct2014) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.21
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804781,"CVE-2014-6507,CVE-2014-6491,CVE-2014-6500,CVE-2014-6469,CVE-2014-6555,CVE-2014-6559,CVE-2014-6494,CVE-2014-6496,CVE-2014-6464",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b73747b5-9b96-46ed-9ad4-e461aa3cede8,"Successful exploitation will allow attackers to disclose potentially
|
|
sensitive information, gain escalated privileges, manipulate certain data, cause a DoS (Denial of Service),
|
|
and compromise a vulnerable system.","Update to version 5.5.40, 5.6.21 or later.","Oracle MySQL Server versions 5.5.39 and prior and 5.6 through 5.6.20.","Unspecified errors in the MySQL Server component via unknown vectors
|
|
related to C API SSL CERTIFICATE HANDLING, SERVER:DML, SERVER:SSL:yaSSL, SERVER:OPTIMIZER,
|
|
SERVER:INNODB DML FOREIGN KEYS.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.39 / 5.6 <= 5.6.20 Security Update (cpuoct2014) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804781)
|
|
Version used: 2022-04-14T19:24:11+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1604,DFN-CERT-2015-1016,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2014-1567,DFN-CERT-2014-1500,DFN-CERT-2014-1357,CB-K15/1518,CB-K15/0964,CB-K15/0567,CB-K15/0415,CB-K14/1482,CB-K14/1420,CB-K14/1299",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808590,"CVE-2016-3486,CVE-2016-3501,CVE-2016-3614,CVE-2016-3459,CVE-2016-5439,CVE-2016-2105,CVE-2016-2106",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6ab9416e-bb7f-4e14-9717-001dd210d2b6,"Successful exploitation will allow remote attacker to affect
|
|
availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.30 and 5.7 through 5.7.12.","Multiple unspecified errors exist in the 'MySQL Server' component
|
|
via unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpujul201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808590)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2017-1972,DFN-CERT-2017-1785,DFN-CERT-2017-0947,DFN-CERT-2017-0675,DFN-CERT-2016-2081,DFN-CERT-2016-1859,DFN-CERT-2016-1722,DFN-CERT-2016-1715,DFN-CERT-2016-1692,DFN-CERT-2016-1401,DFN-CERT-2016-1372,DFN-CERT-2016-1175,DFN-CERT-2016-1174,DFN-CERT-2016-1169,DFN-CERT-2016-1160,DFN-CERT-2016-1103,DFN-CERT-2016-1026,DFN-CERT-2016-0951,DFN-CERT-2016-0815,DFN-CERT-2016-0765,DFN-CERT-2016-0740,DFN-CERT-2016-0702,WID-SEC-2024-0215,CB-K17/1892,CB-K17/1709,CB-K17/0917,CB-K17/0657,CB-K16/1972,CB-K16/1755,CB-K16/1625,CB-K16/1622,CB-K16/1593,CB-K16/1315,CB-K16/1289,CB-K16/1107,CB-K16/1103,CB-K16/1100,CB-K16/1090,CB-K16/1038,CB-K16/0955,CB-K16/0894,CB-K16/0763,CB-K16/0716,CB-K16/0700,CB-K16/0652",""
|
|
192.168.8.111,,443,tcp,7.5,High,98,"Mitigation","SSL/TLS: Report Vulnerable Cipher Suites for HTTPS","This routine reports all SSL/TLS cipher suites accepted by a service
|
|
where attack vectors exists only on HTTPS services.","'Vulnerable' cipher suites accepted by this service via the TLSv1.0 protocol:
|
|
|
|
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
|
|
'Vulnerable' cipher suites accepted by this service via the TLSv1.1 protocol:
|
|
|
|
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
|
|
|
|
",1.3.6.1.4.1.25623.1.0.108031,"CVE-2016-2183,CVE-2016-6329,CVE-2020-12872",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,de05aacc-6fc3-473a-8f6c-843aa026a761,"","The configuration of this services should be changed so
|
|
that it does not accept the listed cipher suites anymore.
|
|
|
|
Please see the references for more resources supporting you with this task.","Services accepting vulnerable SSL/TLS cipher suites via HTTPS.","These rules are applied for the evaluation of the vulnerable cipher suites:
|
|
|
|
- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).","
|
|
Details:
|
|
SSL/TLS: Report Vulnerable Cipher Suites for HTTPS
|
|
(OID: 1.3.6.1.4.1.25623.1.0.108031)
|
|
Version used: 2023-07-20T13:05:17+08:00
|
|
","","","DFN-CERT-2021-1618,DFN-CERT-2021-0775,DFN-CERT-2021-0770,DFN-CERT-2021-0274,DFN-CERT-2020-2141,DFN-CERT-2020-0368,DFN-CERT-2019-1455,DFN-CERT-2019-0068,DFN-CERT-2018-1296,DFN-CERT-2018-0323,DFN-CERT-2017-2070,DFN-CERT-2017-1954,DFN-CERT-2017-1885,DFN-CERT-2017-1831,DFN-CERT-2017-1821,DFN-CERT-2017-1785,DFN-CERT-2017-1626,DFN-CERT-2017-1326,DFN-CERT-2017-1239,DFN-CERT-2017-1238,DFN-CERT-2017-1090,DFN-CERT-2017-1060,DFN-CERT-2017-0968,DFN-CERT-2017-0947,DFN-CERT-2017-0946,DFN-CERT-2017-0904,DFN-CERT-2017-0816,DFN-CERT-2017-0746,DFN-CERT-2017-0677,DFN-CERT-2017-0675,DFN-CERT-2017-0611,DFN-CERT-2017-0609,DFN-CERT-2017-0522,DFN-CERT-2017-0519,DFN-CERT-2017-0482,DFN-CERT-2017-0351,DFN-CERT-2017-0090,DFN-CERT-2017-0089,DFN-CERT-2017-0088,DFN-CERT-2017-0086,DFN-CERT-2016-1943,DFN-CERT-2016-1937,DFN-CERT-2016-1732,DFN-CERT-2016-1726,DFN-CERT-2016-1715,DFN-CERT-2016-1714,DFN-CERT-2016-1588,DFN-CERT-2016-1555,DFN-CERT-2016-1391,DFN-CERT-2016-1378,WID-SEC-2024-1277,WID-SEC-2024-0209,WID-SEC-2024-0064,WID-SEC-2022-2226,WID-SEC-2022-1955,CB-K21/1094,CB-K20/1023,CB-K20/0321,CB-K20/0314,CB-K20/0157,CB-K19/0618,CB-K19/0615,CB-K18/0296,CB-K17/1980,CB-K17/1871,CB-K17/1803,CB-K17/1753,CB-K17/1750,CB-K17/1709,CB-K17/1558,CB-K17/1273,CB-K17/1202,CB-K17/1196,CB-K17/1055,CB-K17/1026,CB-K17/0939,CB-K17/0917,CB-K17/0915,CB-K17/0877,CB-K17/0796,CB-K17/0724,CB-K17/0661,CB-K17/0657,CB-K17/0582,CB-K17/0581,CB-K17/0506,CB-K17/0504,CB-K17/0467,CB-K17/0345,CB-K17/0098,CB-K17/0089,CB-K17/0086,CB-K17/0082,CB-K16/1837,CB-K16/1830,CB-K16/1635,CB-K16/1630,CB-K16/1624,CB-K16/1622,CB-K16/1500,CB-K16/1465,CB-K16/1307,CB-K16/1296",""
|
|
192.168.8.111,,8445,tcp,7.5,High,98,"Mitigation","SSL/TLS: Report Vulnerable Cipher Suites for HTTPS","This routine reports all SSL/TLS cipher suites accepted by a service
|
|
where attack vectors exists only on HTTPS services.","'Vulnerable' cipher suites accepted by this service via the TLSv1.0 protocol:
|
|
|
|
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
|
|
'Vulnerable' cipher suites accepted by this service via the TLSv1.1 protocol:
|
|
|
|
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
TLS_RSA_WITH_3DES_EDE_CBC_SHA (SWEET32)
|
|
|
|
|
|
",1.3.6.1.4.1.25623.1.0.108031,"CVE-2016-2183,CVE-2016-6329,CVE-2020-12872",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1276c9b3-86bc-4592-9738-03ce30fd4d4f,"","The configuration of this services should be changed so
|
|
that it does not accept the listed cipher suites anymore.
|
|
|
|
Please see the references for more resources supporting you with this task.","Services accepting vulnerable SSL/TLS cipher suites via HTTPS.","These rules are applied for the evaluation of the vulnerable cipher suites:
|
|
|
|
- 64-bit block cipher 3DES vulnerable to the SWEET32 attack (CVE-2016-2183).","
|
|
Details:
|
|
SSL/TLS: Report Vulnerable Cipher Suites for HTTPS
|
|
(OID: 1.3.6.1.4.1.25623.1.0.108031)
|
|
Version used: 2023-07-20T13:05:17+08:00
|
|
","","","DFN-CERT-2021-1618,DFN-CERT-2021-0775,DFN-CERT-2021-0770,DFN-CERT-2021-0274,DFN-CERT-2020-2141,DFN-CERT-2020-0368,DFN-CERT-2019-1455,DFN-CERT-2019-0068,DFN-CERT-2018-1296,DFN-CERT-2018-0323,DFN-CERT-2017-2070,DFN-CERT-2017-1954,DFN-CERT-2017-1885,DFN-CERT-2017-1831,DFN-CERT-2017-1821,DFN-CERT-2017-1785,DFN-CERT-2017-1626,DFN-CERT-2017-1326,DFN-CERT-2017-1239,DFN-CERT-2017-1238,DFN-CERT-2017-1090,DFN-CERT-2017-1060,DFN-CERT-2017-0968,DFN-CERT-2017-0947,DFN-CERT-2017-0946,DFN-CERT-2017-0904,DFN-CERT-2017-0816,DFN-CERT-2017-0746,DFN-CERT-2017-0677,DFN-CERT-2017-0675,DFN-CERT-2017-0611,DFN-CERT-2017-0609,DFN-CERT-2017-0522,DFN-CERT-2017-0519,DFN-CERT-2017-0482,DFN-CERT-2017-0351,DFN-CERT-2017-0090,DFN-CERT-2017-0089,DFN-CERT-2017-0088,DFN-CERT-2017-0086,DFN-CERT-2016-1943,DFN-CERT-2016-1937,DFN-CERT-2016-1732,DFN-CERT-2016-1726,DFN-CERT-2016-1715,DFN-CERT-2016-1714,DFN-CERT-2016-1588,DFN-CERT-2016-1555,DFN-CERT-2016-1391,DFN-CERT-2016-1378,WID-SEC-2024-1277,WID-SEC-2024-0209,WID-SEC-2024-0064,WID-SEC-2022-2226,WID-SEC-2022-1955,CB-K21/1094,CB-K20/1023,CB-K20/0321,CB-K20/0314,CB-K20/0157,CB-K19/0618,CB-K19/0615,CB-K18/0296,CB-K17/1980,CB-K17/1871,CB-K17/1803,CB-K17/1753,CB-K17/1750,CB-K17/1709,CB-K17/1558,CB-K17/1273,CB-K17/1202,CB-K17/1196,CB-K17/1055,CB-K17/1026,CB-K17/0939,CB-K17/0917,CB-K17/0915,CB-K17/0877,CB-K17/0796,CB-K17/0724,CB-K17/0661,CB-K17/0657,CB-K17/0582,CB-K17/0581,CB-K17/0506,CB-K17/0504,CB-K17/0467,CB-K17/0345,CB-K17/0098,CB-K17/0089,CB-K17/0086,CB-K17/0082,CB-K16/1837,CB-K16/1830,CB-K16/1635,CB-K16/1630,CB-K16/1624,CB-K16/1622,CB-K16/1500,CB-K16/1465,CB-K16/1307,CB-K16/1296",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.6.48 Security Update (cpujul2020) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.49
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.144286,"CVE-2020-1967,CVE-2020-14539,CVE-2020-14559",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ecc680d2-7078-4b44-84e5-d7d164ddcde7,"","Update to version 5.6.49 or later.","Oracle MySQL Server versions 5.6.48 and prior.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.48 Security Update (cpujul2020) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.144286)
|
|
Version used: 2021-08-16T20:00:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-2192,DFN-CERT-2021-0830,DFN-CERT-2021-0826,DFN-CERT-2021-0444,DFN-CERT-2021-0140,DFN-CERT-2020-2295,DFN-CERT-2020-2286,DFN-CERT-2020-2006,DFN-CERT-2020-1827,DFN-CERT-2020-1788,DFN-CERT-2020-1508,DFN-CERT-2020-0956,DFN-CERT-2020-0930,DFN-CERT-2020-0841,DFN-CERT-2020-0824,DFN-CERT-2020-0822,WID-SEC-2024-0794,WID-SEC-2023-3080,CB-K21/1088,CB-K21/0070,CB-K20/1023,CB-K20/1017,CB-K20/0711,CB-K20/0708,CB-K20/0357",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.37 / 8.0 <= 8.0.28 Security Update (cpuapr2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.38
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.113944,"CVE-2022-0778,CVE-2022-21454,CVE-2022-21417,CVE-2022-21427,CVE-2022-21451,CVE-2022-21444,CVE-2022-21460",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,857989d3-c597-44d3-9a29-a7186af328a8,"","Update to version 5.7.38, 8.0.29 or later.","Oracle MySQL Server version 5.7.37 and prior and 8.0 through
|
|
8.0.28.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.37 / 8.0 <= 8.0.28 Security Update (cpuapr2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.113944)
|
|
Version used: 2022-04-25T22:30:15+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0147,DFN-CERT-2023-2667,DFN-CERT-2023-0081,DFN-CERT-2022-2668,DFN-CERT-2022-2376,DFN-CERT-2022-2268,DFN-CERT-2022-2111,DFN-CERT-2022-2094,DFN-CERT-2022-2059,DFN-CERT-2022-2047,DFN-CERT-2022-1928,DFN-CERT-2022-1837,DFN-CERT-2022-1667,DFN-CERT-2022-1597,DFN-CERT-2022-1469,DFN-CERT-2022-1370,DFN-CERT-2022-1294,DFN-CERT-2022-1264,DFN-CERT-2022-1205,DFN-CERT-2022-1116,DFN-CERT-2022-1115,DFN-CERT-2022-1114,DFN-CERT-2022-1081,DFN-CERT-2022-0955,DFN-CERT-2022-0902,DFN-CERT-2022-0899,DFN-CERT-2022-0898,DFN-CERT-2022-0873,DFN-CERT-2022-0866,DFN-CERT-2022-0865,DFN-CERT-2022-0779,DFN-CERT-2022-0759,DFN-CERT-2022-0627,DFN-CERT-2022-0625,DFN-CERT-2022-0610,DFN-CERT-2022-0603,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2023-1969,WID-SEC-2022-1335,WID-SEC-2022-1228,WID-SEC-2022-1081,WID-SEC-2022-1057,WID-SEC-2022-0836,WID-SEC-2022-0833,WID-SEC-2022-0826,WID-SEC-2022-0767,WID-SEC-2022-0677,WID-SEC-2022-0551,WID-SEC-2022-0530,WID-SEC-2022-0515,WID-SEC-2022-0432,WID-SEC-2022-0393,WID-SEC-2022-0302,WID-SEC-2022-0270,WID-SEC-2022-0261,WID-SEC-2022-0200,WID-SEC-2022-0190,WID-SEC-2022-0169,WID-SEC-2022-0065,CB-K22/0619,CB-K22/0470,CB-K22/0468,CB-K22/0321",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpujan2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.37
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.147465,"CVE-2021-22946,CVE-2022-21367,CVE-2022-21270,CVE-2022-21304,CVE-2022-21344,CVE-2022-21303,CVE-2022-21245,CVE-2021-22947",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ae3702db-4687-416a-b44d-4131ab36ff9e,"","Update to version 5.7.37, 8.0.28 or later.","Oracle MySQL Server version 5.7.36 and prior and 8.0 through
|
|
8.0.27.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpujan2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.147465)
|
|
Version used: 2023-10-19T13:05:21+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-2376,DFN-CERT-2022-2086,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-2047,DFN-CERT-2022-1892,DFN-CERT-2022-1692,DFN-CERT-2022-1571,DFN-CERT-2022-1143,DFN-CERT-2022-0835,DFN-CERT-2022-0586,DFN-CERT-2022-0118,DFN-CERT-2022-0112,DFN-CERT-2022-0052,DFN-CERT-2021-2527,DFN-CERT-2021-1931,WID-SEC-2023-2229,WID-SEC-2023-1350,WID-SEC-2022-1908,WID-SEC-2022-1461,WID-SEC-2022-1335,WID-SEC-2022-1228,WID-SEC-2022-1056,WID-SEC-2022-0875,WID-SEC-2022-0751,WID-SEC-2022-0676,WID-SEC-2022-0393,WID-SEC-2022-0101,CB-K22/0316,CB-K22/0077,CB-K22/0062,CB-K22/0030,CB-K21/0991,CB-K21/0969",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 03 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811989,"CVE-2017-3731",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c3b57d99-a13a-4ce4-8370-55cf7a421f56,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to compromise availability of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version
|
|
5.6.35 and earlier, 5.7.18 and earlier on Windows.","The flaw exists due to an error in
|
|
'Server: Security: Encryption (OpenSSL)'","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (oct2017-3236626) 03 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811989)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1377,DFN-CERT-2018-0323,DFN-CERT-2018-0011,DFN-CERT-2017-1972,DFN-CERT-2017-1831,DFN-CERT-2017-1830,DFN-CERT-2017-1828,DFN-CERT-2017-1827,DFN-CERT-2017-1807,DFN-CERT-2017-1785,DFN-CERT-2017-1244,DFN-CERT-2017-1243,DFN-CERT-2017-1236,DFN-CERT-2017-0746,DFN-CERT-2017-0675,DFN-CERT-2017-0673,DFN-CERT-2017-0608,DFN-CERT-2017-0314,DFN-CERT-2017-0313,DFN-CERT-2017-0307,DFN-CERT-2017-0301,DFN-CERT-2017-0272,DFN-CERT-2017-0219,DFN-CERT-2017-0178,DFN-CERT-2017-0162,DFN-CERT-2017-0156,WID-SEC-2022-1914,WID-SEC-2022-0673,CB-K22/0045,CB-K18/0296,CB-K18/0006,CB-K17/1892,CB-K17/1753,CB-K17/1749,CB-K17/1748,CB-K17/1747,CB-K17/1725,CB-K17/1709,CB-K17/1205,CB-K17/1204,CB-K17/1198,CB-K17/0724,CB-K17/0659,CB-K17/0657,CB-K17/0583,CB-K17/0308,CB-K17/0307,CB-K17/0302,CB-K17/0289,CB-K17/0267,CB-K17/0214,CB-K17/0175,CB-K17/0158,CB-K17/0153",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-01 (Feb 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805132,"CVE-2015-0411,CVE-2014-6568,CVE-2015-0382,CVE-2015-0381,CVE-2015-0374",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,eaa37b55-efd3-4bfd-b4d3-2cfc1c331aa0,"Successful exploitation will allow attackers
|
|
to disclose potentially sensitive information, manipulate certain data,
|
|
cause a DoS (Denial of Service), and compromise a vulnerable system.","Apply the patch from the referenced advisory.","Oracle MySQL Server version 5.5.40 and earlier,
|
|
and 5.6.21 and earlier on Windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to Server:- Security:Encryption,
|
|
InnoDB:DML, Replication, and Security:Privileges:Foreign Key.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-01 (Feb 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805132)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1264,DFN-CERT-2015-1016,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2015-0074,CB-K15/1193,CB-K15/0964,CB-K15/0567,CB-K15/0415,CB-K15/0073",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 05 - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811993,"CVE-2017-10283,CVE-2017-10294,CVE-2017-10286,CVE-2017-10155,CVE-2017-10314,CVE-2017-10276,CVE-2017-10227",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,2687315b-2bcf-45cc-a946-573e84e708ca,"Successful exploitation of this
|
|
vulnerability will allow remote attackers to compromise availability
|
|
integrity and confidentiality of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version
|
|
5.6.37 and earlier, 5.7.19 and earlier on Windows","Multiple flaws exist due to:
|
|
|
|
- An error in 'Server: Performance Schema' component.
|
|
|
|
- An error in 'Server: Optimizer' component.
|
|
|
|
- An error in 'Server: InnoDB' component.
|
|
|
|
- An error in 'Server: Pluggable Auth' component.
|
|
|
|
- An error in 'Server: Memcached' component.
|
|
|
|
- An error in 'Server: FTS' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (oct2017-3236626) 05 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811993)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K18/0224,CB-K17/2048,CB-K17/1748",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.30 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
|
|
vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.42
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149534,"CVE-2023-21912",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c4c3c6a8-1482-4e5f-b9eb-3aeb261daf1c,"","Update to version 5.7.42, 8.0.31 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
|
|
8.0.30.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.30 Security Update (cpuapr2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149534)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-1058,DFN-CERT-2023-1037,DFN-CERT-2023-0885,WID-SEC-2023-2031,WID-SEC-2023-1033",""
|
|
192.168.8.77,,3306,tcp,7.5,High,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 06 - Windows","Oracle MySQL is prone to multiple denial of service (DoS) vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.810890,"CVE-2017-3450,CVE-2017-3599",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,49cd612c-f927-4b11-a05b-89b1dd744155,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to conduct a denial-of-service condition.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.35 and earlier,
|
|
5.7.17 and earlier on Windows","Multiple flaws exist due to unspecified
|
|
errors in the 'Server: Memcached', 'Server: Pluggable Auth' components of the
|
|
application.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2017-3236618) 06 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.810890)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-0675,CB-K17/1732,CB-K17/1604,CB-K17/0657",""
|
|
192.168.8.77,,3306,tcp,7.4,High,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.20
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804780,"CVE-2014-0224,CVE-2014-6489,CVE-2014-6564,CVE-2014-6474,CVE-2010-5298,CVE-2014-0195,CVE-2014-0198,CVE-2014-0221,CVE-2014-3470",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f7565430-435b-4067-bd5c-0bd7ec8a71b5,"Successful exploitation will allow attackers to disclose potentially
|
|
sensitive information, gain escalated privileges, manipulate certain data, cause a DoS (Denial of Service),
|
|
and compromise a vulnerable system.","Update to version 5.6.20 or later.","Oracle MySQL Server versions 5.6 through 5.6.19.","Unspecified errors in the MySQL Server component via unknown vectors
|
|
related to SERVER:INNODB FULLTEXT SEARCH DML, SERVER:SP, and SERVER:MEMCACHED.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804780)
|
|
Version used: 2023-11-02T13:05:26+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0388,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2015-0396,DFN-CERT-2015-0082,DFN-CERT-2015-0079,DFN-CERT-2015-0078,DFN-CERT-2014-1717,DFN-CERT-2014-1632,DFN-CERT-2014-1567,DFN-CERT-2014-1364,DFN-CERT-2014-1357,DFN-CERT-2014-1350,DFN-CERT-2014-1265,DFN-CERT-2014-1209,DFN-CERT-2014-1094,DFN-CERT-2014-1061,DFN-CERT-2014-1017,DFN-CERT-2014-0917,DFN-CERT-2014-0809,DFN-CERT-2014-0793,DFN-CERT-2014-0789,DFN-CERT-2014-0778,DFN-CERT-2014-0768,DFN-CERT-2014-0752,DFN-CERT-2014-0747,DFN-CERT-2014-0738,DFN-CERT-2014-0715,DFN-CERT-2014-0714,DFN-CERT-2014-0709,DFN-CERT-2014-0585,DFN-CERT-2014-0548,DFN-CERT-2014-0526,DFN-CERT-2014-0482,WID-SEC-2023-0502,WID-SEC-2023-0501,WID-SEC-2023-0500,CB-K15/0567,CB-K15/0415,CB-K15/0384,CB-K15/0080,CB-K15/0079,CB-K15/0074,CB-K14/1617,CB-K14/1537,CB-K14/1482,CB-K14/1299,CB-K14/1297,CB-K14/1294,CB-K14/1202,CB-K14/1174,CB-K14/1153,CB-K14/1050,CB-K14/1016,CB-K14/0968,CB-K14/0876,CB-K14/0772,CB-K14/0762,CB-K14/0756,CB-K14/0746,CB-K14/0736,CB-K14/0722,CB-K14/0716,CB-K14/0708,CB-K14/0684,CB-K14/0683,CB-K14/0680,CB-K14/0560,CB-K14/0526,CB-K14/0509,CB-K14/0459",""
|
|
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.806876,"CVE-2016-0608,CVE-2016-0609,CVE-2016-0606,CVE-2016-0600,CVE-2016-0598,CVE-2016-0597,CVE-2016-0546,CVE-2016-0505",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,42376285-83a9-4021-ad7e-6b980e525ec4,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.46 and prior, 5.6 through 5.6.27 and version 5.7.9.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 / 5.7.9 Security Update (cpuja...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.806876)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0143,DFN-CERT-2016-0104,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0646,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K16/0133,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-02 (Sep 2016) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.33
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808699,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,885d2858-1b38-4cee-a4df-ffbd19cb80a4,"Successful exploitation will allow an
|
|
remote attacker to gain elevated privileges on the affected system, also
|
|
could allow buffer overflow attacks.","Upgrade to Oracle MySQL Server 5.6.33 or later.","Oracle MySQL Server 5.6.x to 5.6.32
|
|
on windows","Multiple errors exist. Please see the references for more information.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Unspecified Vulnerability-02 (Sep 2016) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808699)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","",""
|
|
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-06 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805769,"CVE-2015-4879,CVE-2015-4819",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8d7fbb92-fcc1-43b5-badf-ac6e50506685,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality, integrity, and
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server Server 5.5.44 and
|
|
earlier, and 5.6.25 and earlier","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-06 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805769)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-0845,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1692,DFN-CERT-2015-1638,CB-K16/1122,CB-K16/0791,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K15/1844,CB-K15/1600,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,7.2,High,80,"VendorFix","Oracle MySQL Server <= 5.7.29 / 8.0 <= 8.0.19 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to a vulnerability in the parser.","Installed version: 5.6.10
|
|
Fixed version: 5.7.30
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145800,"CVE-2021-2144",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,355024e4-64c9-4bb7-b8a5-47f48e98d309,"","Update to version 5.7.30, 8.0.20 or later.","Oracle MySQL Server version 5.7.29 and prior and 8.0 through 8.0.19.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.29 / 8.0 <= 8.0.19 Security Update (cpuapr2021) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145800)
|
|
Version used: 2021-08-26T21:01:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-0821,WID-SEC-2023-0065,CB-K21/0421",""
|
|
192.168.8.77,,3306,tcp,7.1,High,80,"VendorFix","Oracle MySQL Security Update (cpujul2018 - 05) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See reference
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.813712,"CVE-2018-0739,CVE-2018-3064,CVE-2018-3062,CVE-2017-3737,CVE-2017-3738",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,83273840-df0b-4fb9-bfe6-5db92130df9b,"Successful exploitation will allow remote
|
|
attackers to have an impact on integrity and availability.","The vendor has released updates. Please see the references for
|
|
more information.","Oracle MySQL version 5.6.40 and prior,
|
|
5.7.22 and prior, 8.0.11 and prior.","Multiple flaws exist due to multiple errors
|
|
in 'InnoDB', 'Server: Installing (OpenSSL)' and 'Server: Memcached' components
|
|
of MySQL Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Security Update (cpujul2018 - 05) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.813712)
|
|
Version used: 2022-07-20T18:33:02+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-1541,DFN-CERT-2020-0403,DFN-CERT-2019-1996,DFN-CERT-2019-1722,DFN-CERT-2019-1588,DFN-CERT-2019-1398,DFN-CERT-2019-1285,DFN-CERT-2019-1152,DFN-CERT-2019-1108,DFN-CERT-2019-1047,DFN-CERT-2019-0484,DFN-CERT-2019-0351,DFN-CERT-2019-0112,DFN-CERT-2018-2210,DFN-CERT-2018-2113,DFN-CERT-2018-2109,DFN-CERT-2018-2103,DFN-CERT-2018-1931,DFN-CERT-2018-1832,DFN-CERT-2018-1726,DFN-CERT-2018-1649,DFN-CERT-2018-1411,DFN-CERT-2018-1408,DFN-CERT-2018-1407,DFN-CERT-2018-1402,DFN-CERT-2018-1377,DFN-CERT-2018-1364,DFN-CERT-2018-1326,DFN-CERT-2018-1068,DFN-CERT-2018-0985,DFN-CERT-2018-0816,DFN-CERT-2018-0759,DFN-CERT-2018-0736,DFN-CERT-2018-0729,DFN-CERT-2018-0725,DFN-CERT-2018-0723,DFN-CERT-2018-0696,DFN-CERT-2018-0673,DFN-CERT-2018-0655,DFN-CERT-2018-0584,DFN-CERT-2018-0536,DFN-CERT-2018-0318,DFN-CERT-2018-0223,DFN-CERT-2018-0212,DFN-CERT-2018-0101,DFN-CERT-2018-0064,DFN-CERT-2017-2237,DFN-CERT-2017-2216,WID-SEC-2024-0205,WID-SEC-2023-2048,WID-SEC-2023-1969,WID-SEC-2023-1594,WID-SEC-2022-0673,CB-K22/0045,CB-K21/0782,CB-K19/0045,CB-K18/1075,CB-K18/1012,CB-K18/1009,CB-K18/1006,CB-K18/1004,CB-K18/0813,CB-K18/0808,CB-K18/0800,CB-K18/0799,CB-K18/0795,CB-K18/0794,CB-K18/0791,CB-K18/0790,CB-K18/0636,CB-K18/0608,CB-K18/0607,CB-K18/0606,CB-K18/0605,CB-K18/0545,CB-K18/0495,CB-K18/0301,CB-K18/0205,CB-K18/0195,CB-K18/0096,CB-K18/0057,CB-K17/2139,CB-K17/2122",""
|
|
192.168.8.77,,3306,tcp,7.1,High,80,"VendorFix","Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Update (cpujan2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.112489,"CVE-2019-2534,CVE-2019-2529,CVE-2019-2482,CVE-2019-2455,CVE-2019-2503,CVE-2018-0734,CVE-2019-2537,CVE-2019-2481,CVE-2019-2507,CVE-2019-2531,CVE-2018-5407",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,18c87cae-ea65-498f-b4b4-789b8dc7787e,"Successful exploitation of this vulnerability can result in unauthorized
|
|
access to critical data or complete access to all MySQL Server accessible data and unauthorized ability
|
|
to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.","Updates are available. Apply the necessary patch from the referenced link.","Oracle MySQL Server versions 5.6.42 and prior, 5.7 through 5.7.24 and 8.0 through 8.0.13.","The attacks range in variety and difficulty. Most of them allow an attacker
|
|
with network access via multiple protocols to compromise the MySQL Server.
|
|
|
|
For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.112489)
|
|
Version used: 2023-02-02T18:09:00+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-0326,DFN-CERT-2019-2457,DFN-CERT-2019-2456,DFN-CERT-2019-2305,DFN-CERT-2019-2300,DFN-CERT-2019-2046,DFN-CERT-2019-1996,DFN-CERT-2019-1897,DFN-CERT-2019-1746,DFN-CERT-2019-1713,DFN-CERT-2019-1617,DFN-CERT-2019-1614,DFN-CERT-2019-1600,DFN-CERT-2019-1588,DFN-CERT-2019-1562,DFN-CERT-2019-1455,DFN-CERT-2019-1450,DFN-CERT-2019-1240,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0782,DFN-CERT-2019-0781,DFN-CERT-2019-0778,DFN-CERT-2019-0775,DFN-CERT-2019-0772,DFN-CERT-2019-0484,DFN-CERT-2019-0232,DFN-CERT-2019-0204,DFN-CERT-2019-0112,DFN-CERT-2019-0104,DFN-CERT-2019-0103,DFN-CERT-2019-0102,DFN-CERT-2018-2541,DFN-CERT-2018-2539,DFN-CERT-2018-2513,DFN-CERT-2018-2456,DFN-CERT-2018-2444,DFN-CERT-2018-2396,DFN-CERT-2018-2360,DFN-CERT-2018-2338,DFN-CERT-2018-2214,WID-SEC-2023-3083,WID-SEC-2023-1594,WID-SEC-2022-1696,WID-SEC-2022-0673,WID-SEC-2022-0517,CB-K22/0045,CB-K20/0324,CB-K20/0136,CB-K19/1121,CB-K19/0696,CB-K19/0622,CB-K19/0615,CB-K19/0321,CB-K19/0320,CB-K19/0319,CB-K19/0318,CB-K19/0316,CB-K19/0314,CB-K19/0050,CB-K19/0044,CB-K18/1173,CB-K18/1065,CB-K18/1039",""
|
|
192.168.8.77,,3306,tcp,7.1,High,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 04 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.812650,"CVE-2018-2562",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,85d57b61-c5b1-4938-8c51-52f3b125ef06,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to conduct a denial-of-service attack and partially
|
|
modify data.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.58 and earlier,
|
|
5.6.38 and earlier, 5.7.19 and earlier on Windows","The flaw exists due to an error in
|
|
'Server:Partition' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jan2018-3236628) 04 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.812650)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0733,DFN-CERT-2018-0515,DFN-CERT-2018-0424,DFN-CERT-2018-0286,DFN-CERT-2018-0101,CB-K18/0480,CB-K18/0392,CB-K18/0265,CB-K18/0096",""
|
|
192.168.8.77,,3306,tcp,7.0,High,80,"VendorFix","Oracle MySQL Server <= 5.5.51 / 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809372,"CVE-2016-3492,CVE-2016-5626,CVE-2016-5629,CVE-2016-5616,CVE-2016-5617,CVE-2016-8283,CVE-2016-6663,CVE-2016-6664",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6a2c94bc-3493-49ac-903e-1e055166947c,"Successful exploitation of these vulnerabilities will allow remote
|
|
authenticated attackers to cause denial of service conditions and gain elevated privileges.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.51 and prior, 5.6 through 5.6.32 and 5.7 through 5.7.14.","Multiple flaws exist due to multiple unspecified errors in the
|
|
'Server:GIS', 'Server:Federated', 'Server:Optimizer', 'Server:Types', 'Server:Error Handling' and
|
|
'Server:MyISAM' components.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.51 / 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809372)
|
|
Version used: 2021-10-13T19:01:26+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-1473,DFN-CERT-2018-0242,DFN-CERT-2017-1341,DFN-CERT-2017-0138,DFN-CERT-2016-2089,DFN-CERT-2016-1950,DFN-CERT-2016-1859,DFN-CERT-2016-1790,DFN-CERT-2016-1714,CB-K18/0224,CB-K17/1298,CB-K17/0139,CB-K16/1979,CB-K16/1846,CB-K16/1755,CB-K16/1714,CB-K16/1624",""
|
|
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.806879,"CVE-2016-0611,CVE-2016-0607,CVE-2016-0504,CVE-2016-0503",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f7233b70-a761-47bd-bfe6-a6e2dbfde8ab,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.27 and version 5.7.9.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.27 / 5.7.9 Security Update (cpujan2016) - Win...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.806879)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0695,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0646,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 01 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Vulnerable range: 5.6 - 5.6.14
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804072,"CVE-2013-5860,CVE-2013-5881,CVE-2014-0431",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6c2c6775-fa1d-4f99-ab7f-d0f781511b91,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.14 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to GIS and InnoDB.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 01 (Jan 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804072)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0055",""
|
|
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2017-2881727) 03 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809867,"CVE-2016-8318,CVE-2016-8327,CVE-2017-3273,CVE-2017-3257",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,301bfc68-33e4-4e85-bc45-de15f2887bcd,"Successful exploitation of these
|
|
vulnerabilities will allow remote to have an impact on availability,
|
|
confidentiality and integrity.","Apply the patch from the referenced advisory.","Oracle MySQL version
|
|
5.6.34 and earlier, 5.7.16 and earlier, on Windows","Multiple flaws exist due to: multiple
|
|
unspecified errors in sub components 'Security: Encryption', 'DDL',
|
|
'InnoDB' and 'Replication'.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jan2017-2881727) 03 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809867)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-0090,CB-K18/0224,CB-K17/1732,CB-K17/1604,CB-K17/0098",""
|
|
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 02 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Vulnerable range: 5.6 - 5.6.13
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804073,"CVE-2014-0427,CVE-2014-0430,CVE-2014-0433,CVE-2013-5882,CVE-2013-5894",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,46cb307c-380d-4c03-be12-12b6218c2c74,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.13 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to FTS, Performance Schema, Thread Pooling, Stored Procedures, and InnoDB.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 02 (Jan 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804073)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0055",""
|
|
192.168.8.77,,3306,tcp,6.8,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.11
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117208,"CVE-2013-2395,CVE-2013-2381,CVE-2013-1570,CVE-2013-1567,CVE-2013-1566",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,38618248-ef98-4f41-9c32-3661e43f537b,"Successful exploitation could allow remote attackers to affect
|
|
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.6.11 or later.","Oracle MySQL Server versions 5.6 through 5.6.10.","Unspecified error in Data Manipulation Language, Server Privileges,
|
|
MemCached and InnoDB.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117208)
|
|
Version used: 2022-04-25T22:50:49+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-0798",""
|
|
192.168.8.77,,3306,tcp,6.7,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2017-2881727) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809865,"CVE-2017-3238,CVE-2017-3318,CVE-2017-3291,CVE-2017-3317,CVE-2017-3258,CVE-2017-3312,CVE-2017-3313,CVE-2017-3244,CVE-2017-3265",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fcae09ba-1e94-4d04-ad60-f41fdd4d6dc4,"Successful exploitation of this
|
|
vulnerability will allow remote to have an impact on availability,
|
|
confidentiality and integrity.","Apply the patch from the referenced advisory.","Oracle MySQL version
|
|
5.5.53 and earlier, 5.6.34 and earlier, 5.7.16 and earlier on Windows","Multiple flaws exist due to: multiple
|
|
unspecified errors in sub components 'Error Handling', 'Logging', 'MyISAM',
|
|
'Packaging', 'Optimizer', 'DML' and 'DDL'.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jan2017-2881727) 02 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809865)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1341,DFN-CERT-2017-0959,DFN-CERT-2017-0430,DFN-CERT-2017-0090,CB-K18/0224,CB-K17/1732,CB-K17/1604,CB-K17/1298,CB-K17/0927,CB-K17/0423,CB-K17/0098",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2018-3678067) 01 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.813142,"CVE-2018-2805",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e08fffee-9f5a-45f2-8fa7-c6d806255163,"Successful exploitation of this
|
|
vulnerability will allow remote attackers to conduct a denial of service
|
|
condition.","Apply the latest patch from vendor. Please see the references for more information.","Oracle MySQL version 5.6.39 and earlier
|
|
on Windows","The flaw exists due to an error in the
|
|
'GIS Extension' of MySQL Server","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2018-3678067) 01 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.813142)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-0723,WID-SEC-2023-1594,CB-K18/0608",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Jul 2015)","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805928,"CVE-2015-4772,CVE-2015-4771,CVE-2015-4769,CVE-2015-4761,CVE-2015-4767,CVE-2015-2641,CVE-2015-2611,CVE-2015-2617,CVE-2015-2639,CVE-2015-2661",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,36268589-71a3-4a4f-a7ca-c1f9f01c91dc,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality, integrity, and
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.24 and earlier on windows.","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server : Partition, Server : Memcached
|
|
Server : Security : Firewall, RBR, Server : Optimizer, Server : InnoDB, DML,
|
|
Server : I_S, Server : Pluggable Auth, Server : Security : Privileges, GIS,
|
|
Partition and Client.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Jul 2015)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805928)
|
|
Version used: 2024-02-20T13:05:48+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1071,CB-K15/1020",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 02 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804575,"CVE-2014-2430,CVE-2014-2431,CVE-2014-2436,CVE-2014-2440",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,388a3052-0cb5-48b9-aedf-b52bb1334ed3,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.36 and earlier and 5.6.16 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Performance Schema, Options, RBR.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 02 (May 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804575)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0477,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0464,CB-K14/0452",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 03 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Vulnerable range: 5.6 - 5.6.15
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804576,"CVE-2014-2434,CVE-2014-2442,CVE-2014-2444,CVE-2014-2450,CVE-2014-2451",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4de4dfe8-8be4-4dca-ab0e-05e5609924ae,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.15 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to DML, MyISAM, InnoDB, Optimizer, and Privileges.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 03 (May 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804576)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0452",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-01 (Jul 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Vulnerable range: 5.6 - 5.6.17
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804721,"CVE-2014-4238,CVE-2014-4240,CVE-2014-4233,CVE-2014-2484,CVE-2014-4214",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e9ebe825-a323-4598-ba2b-d3135d8b0b00,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.17 and earlier on Windows","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to SROPTZR, SRREP, SRFTS, and SRSP.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-01 (Jul 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804721)
|
|
Version used: 2024-02-16T13:06:55+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0911,CB-K14/0868",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-02 (Jul 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804722,"CVE-2014-4258,CVE-2014-4260",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b454eb37-b363-43ee-9235-720f76caf3f9,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.37 and earlier and 5.6.17 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to SRINFOSC and SRCHAR.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-02 (Jul 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804722)
|
|
Version used: 2024-02-16T13:06:55+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-0593,DFN-CERT-2014-1500,DFN-CERT-2014-0930,DFN-CERT-2014-0911,CB-K15/0567,CB-K14/1420,CB-K14/0891,CB-K14/0868",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Security Update (cpujul2018 - 02) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See reference
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.813706,"CVE-2018-2767,CVE-2018-3066,CVE-2018-3058,CVE-2018-3070",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,5738f358-0438-4a3b-ba2a-ae48b9077bb2,"Successful exploitation will allow remote
|
|
attackers to have an impact on confidentiality, integrity and availability.","The vendor has released updates. Please see the references for
|
|
more information.","Oracle MySQL version 5.5.60 and earlier,
|
|
5.6.40 and earlier, 5.7.22 and earlier.","Multiple flaws exist due to errors in
|
|
'Server: Security: Encryption', 'Server: Options', 'MyISAM', 'Client mysqldump'
|
|
components of application.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Security Update (cpujul2018 - 02) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.813706)
|
|
Version used: 2023-11-04T00:10:08+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1614,DFN-CERT-2019-1588,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0484,DFN-CERT-2019-0112,DFN-CERT-2018-1649,DFN-CERT-2018-1402,DFN-CERT-2018-1276,DFN-CERT-2018-0913,WID-SEC-2023-1594,CB-K18/0795",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809380,"CVE-2016-5609,CVE-2016-5627,CVE-2016-5630,CVE-2016-8284",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4b33504e-d424-40bb-adec-ab18137c17fc,"Successful exploitation of this vulnerability will allow a remote
|
|
authenticated user to cause denial of service conditions.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.31 and 5.7 through 5.7.13.","Multiple flaws exist due to multiple unspecified errors within
|
|
the 'Server: DML', 'Server: Replication' and 'Server: InnoDB' components.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update (cpuoct201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809380)
|
|
Version used: 2022-08-08T18:24:51+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1790,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1742,CB-K16/1714,CB-K16/1624",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.1.67 / 5.5 <= 5.5.29 / 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.11
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117206,"CVE-2013-2378,CVE-2013-1506",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,133379ed-7dc3-4d40-b1d1-7712b3b289d3,"Successful exploitation could allow remote attackers to affect
|
|
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.1.68, 5.5.30, 5.6.11 or later.","Oracle MySQL Server versions 5.1.67 and prior, 5.5 through 5.5.29 and 5.6 through 5.6.10.","Unspecified error in some unknown vectors related to Information Schema.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.1.67 / 5.5 <= 5.5.29 / 5.6 <= 5.6.10 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117206)
|
|
Version used: 2022-07-21T18:11:30+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-0839,DFN-CERT-2013-0798",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.1.68 / 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.11
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117207,"CVE-2013-2375,CVE-2013-1544,CVE-2013-1532,CVE-2013-2389,CVE-2013-2392,CVE-2013-2391",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,69d455af-1c68-4af6-b70a-e0fb31f339c3,"Successful exploitation could allow remote attackers to affect
|
|
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.1.69, 5.5.31, 5.6.11 or later.","Oracle MySQL Server versions 5.1.68 and prior, 5.5 through 5.5.30 and 5.6 through 5.6.10.","Unspecified error in Server Optimizer, Server Privileges, InnoDB, and in
|
|
some unspecified vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.1.68 / 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117207)
|
|
Version used: 2022-07-21T18:11:30+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-0882,DFN-CERT-2013-0839,DFN-CERT-2013-0798",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.38 / 5.6 <= 5.6.19 Security Update (cpuoct2014) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.20
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804782,"CVE-2014-6530,CVE-2012-5615,CVE-2014-6495,CVE-2014-6478,CVE-2014-4274,CVE-2014-4287,CVE-2014-6484,CVE-2014-6505,CVE-2014-6463,CVE-2014-6551",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,cc88a8bb-b7df-4e56-bcf5-12fa5da705cd,"Successful exploitation will allow attackers to disclose potentially
|
|
sensitive information, gain escalated privileges, manipulate certain data, cause a DoS (Denial of Service),
|
|
and compromise a vulnerable system.","Update to version 5.5.39, 5.6.20 or later.","Oracle MySQL Server versions 5.5.38 and prior and 5.6 through 5.6.19.","Unspecified errors in the MySQL Server component via unknown vectors
|
|
related to CLIENT:MYSQLADMIN, CLIENT:MYSQLDUMP, SERVER:MEMORY STORAGE ENGINE, SERVER:SSL:yaSSL, SERVER:DML,
|
|
SERVER:SSL:yaSSL, SERVER:REPLICATION ROW FORMAT BINARY LOG DML, SERVER:CHARACTER SETS, and SERVER:MyISAM.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.38 / 5.6 <= 5.6.19 Security Update (cpuoct2014) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804782)
|
|
Version used: 2021-02-12T19:09:59+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1604,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2014-1567,DFN-CERT-2014-1500,DFN-CERT-2014-1489,DFN-CERT-2014-1357,DFN-CERT-2013-0259,CB-K15/1518,CB-K15/0567,CB-K15/0415,CB-K14/1482,CB-K14/1420,CB-K14/1412,CB-K14/1299",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.31 / 5.6 <= 5.6.11 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.806878,"CVE-2016-0502",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,35da613d-7d28-44a4-a714-cffc2cef0ac3,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.31 and prior and 5.6 through 5.6.11.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.31 / 5.6 <= 5.6.11 Security Update (cpujan2016) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.806878)
|
|
Version used: 2022-09-12T18:18:03+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 04 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811436,"CVE-2017-3633,CVE-2017-3634,CVE-2017-3649,CVE-2017-3647",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0efe44ed-eb44-43b1-b608-7d5433dc9b49,"Successful exploitation of this vulnerability
|
|
will allow remote to partially modify data and cause denial of service conditions.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.36 and earlier,
|
|
5.7.18 and earlier, on Windows","Multiple flaws exist due to
|
|
|
|
- A flaw in the Server: Memcached component.
|
|
|
|
- A flaw in the Server: DML component.
|
|
|
|
- A flaw in the Server: Replication component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jul2017-3236622) 04 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811436)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1243,CB-K17/1732,CB-K17/1604,CB-K17/1205",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.50 / 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809374,"CVE-2016-5612",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,52d394f1-541d-4e78-b105-1eda5a21ff07,"Successful exploitation of this vulnerability will allow a remote
|
|
authenticated user to cause denial of service conditions.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.50 and prior, 5.6 through 5.6.31 and 5.7 through 5.7.13.","The flaw exists due to an unspecified error in the 'Server: DML'
|
|
component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.50 / 5.6 <= 5.6.31 / 5.7 <= 5.7.13 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809374)
|
|
Version used: 2022-07-21T18:11:30+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1849,DFN-CERT-2016-1790,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1742,CB-K16/1714,CB-K16/1624",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Update (cpujul2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.45
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.142645,"CVE-2019-2805,CVE-2019-2740,CVE-2019-2819,CVE-2019-2739,CVE-2019-2737,CVE-2019-2738",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7c7003e0-fafd-4871-b642-ffecb6f61c4c,"","Update to version 5.6.45, 5.7.27, 8.0.17 or later.","Oracle MySQL Server versions 5.6.44 and prior, 5.7 through 5.7.26 and 8.0 through 8.0.16.","Oracle MySQL Server is prone to multiple denial of service vulnerabilities.
|
|
|
|
For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.142645)
|
|
Version used: 2023-10-28T00:11:32+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-2620,DFN-CERT-2020-2180,DFN-CERT-2020-0658,DFN-CERT-2020-0517,DFN-CERT-2019-2695,DFN-CERT-2019-2656,DFN-CERT-2019-2300,DFN-CERT-2019-2008,DFN-CERT-2019-1713,DFN-CERT-2019-1683,DFN-CERT-2019-1568,DFN-CERT-2019-1453,CB-K19/0620",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 / 8.0 <= 8.0.17 Security Update (cpuoct2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.46
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.143030,"CVE-2019-2974,CVE-2019-2911",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,994d89c7-6faf-4a61-bc5e-c49a8300f5e2,"","Update to version 5.6.46, 5.7.28, 8.0.18 or later.","Oracle MySQL Server versions 5.6.45 and prior, 5.7 through 5.7.27 and 8.0 through 8.0.17.","Oracle MySQL Server is prone to multiple vulnerabilities.
|
|
|
|
For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 / 8.0 <= 8.0.17 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.143030)
|
|
Version used: 2021-09-07T22:01:38+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-2763,DFN-CERT-2020-2756,DFN-CERT-2020-2620,DFN-CERT-2020-2299,DFN-CERT-2020-2180,DFN-CERT-2020-1827,DFN-CERT-2020-0658,DFN-CERT-2020-0517,DFN-CERT-2020-0103,DFN-CERT-2019-2695,DFN-CERT-2019-2687,DFN-CERT-2019-2656,DFN-CERT-2019-2301,DFN-CERT-2019-2149,CB-K20/1030,CB-K20/0109,CB-K19/0915",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.46 Security Update (cpujan2020) - Windows","Oracle MySQL Server is prone to an unspecified denial of service vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.47
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.143359,"CVE-2020-2579",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0b7966d8-f0ec-48b4-bd1a-a748c9f622fa,"","Update to version 5.6.47 or later.","Oracle MySQL Server versions 5.6.46 and prior.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.46 Security Update (cpujan2020) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.143359)
|
|
Version used: 2021-08-16T17:00:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-1827,DFN-CERT-2020-1078,DFN-CERT-2020-0096,CB-K20/0038",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.49 / 5.7 <= 5.7.31 / 8.0 <= 8.0.21 Security Update (cpuoct2020) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.50
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.108959,"CVE-2020-14765,CVE-2020-14769,CVE-2020-14812,CVE-2020-14793,CVE-2020-14672,CVE-2020-14867",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b50ec0ee-64bf-4e71-a755-ae3adbef647a,"","Update to version 5.6.50, 5.7.32, 8.0.22 or later.","Oracle MySQL Server versions 5.6.49 and prior, 5.7 through 5.7.31 and 8.0 through 8.0.21.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.49 / 5.7 <= 5.7.31 / 8.0 <= 8.0.21 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.108959)
|
|
Version used: 2021-08-16T20:00:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-2155,DFN-CERT-2021-0002,DFN-CERT-2020-2763,DFN-CERT-2020-2756,DFN-CERT-2020-2620,DFN-CERT-2020-2380,DFN-CERT-2020-2295,CB-K20/1066,CB-K20/1017",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.33
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145794,"CVE-2020-1971,CVE-2021-2178,CVE-2021-2202",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0aa50262-bb05-490d-9557-a0595d6a4e58,"","Update to version 5.7.33, 8.0.23 or later.","Oracle MySQL Server version 5.7.32 and prior and 8.0 through 8.0.22.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpuapr2021) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145794)
|
|
Version used: 2023-10-21T00:09:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-1582,DFN-CERT-2022-1215,DFN-CERT-2022-0076,DFN-CERT-2021-2190,DFN-CERT-2021-2155,DFN-CERT-2021-2126,DFN-CERT-2021-1504,DFN-CERT-2021-1225,DFN-CERT-2021-0924,DFN-CERT-2021-0862,DFN-CERT-2021-0828,DFN-CERT-2021-0826,DFN-CERT-2021-0821,DFN-CERT-2021-0819,DFN-CERT-2021-0715,DFN-CERT-2021-0408,DFN-CERT-2021-0338,DFN-CERT-2021-0255,DFN-CERT-2021-0134,DFN-CERT-2021-0131,DFN-CERT-2021-0128,DFN-CERT-2021-0120,DFN-CERT-2021-0107,DFN-CERT-2021-0078,DFN-CERT-2021-0012,DFN-CERT-2020-2791,DFN-CERT-2020-2668,WID-SEC-2024-0794,WID-SEC-2023-0067,WID-SEC-2023-0065,WID-SEC-2022-2047,WID-SEC-2022-1908,WID-SEC-2022-1000,WID-SEC-2022-0585,CB-K21/1065,CB-K21/0788,CB-K21/0615,CB-K21/0421,CB-K21/0111,CB-K21/0062,CB-K21/0006,CB-K20/1217",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Update (cpuoct2018 - 01) - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See reference
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.814256,"CVE-2018-3156,CVE-2018-3251,CVE-2018-3278,CVE-2018-3276,CVE-2018-3143,CVE-2018-3247",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6bd9077d-cf7b-4e0d-956b-fc21cec40706,"Successful exploitation will allow remote
|
|
attackers to have an impact on integrity and availability.","The vendor has released updates. Please see the references for
|
|
more information.","Oracle MySQL version 5.6.x through 5.6.41,
|
|
5.7.x through 5.7.23, 8.0.x through 8.0.12.","Multiple flaws exist due to:
|
|
|
|
- Multiple unspecified errors within 'InnoDB' component of MySQL Server.
|
|
|
|
- An unspecified error within 'Server: Merge' component of MySQL Server.
|
|
|
|
- An unspecified error within 'Server: Memcached' component of MySQL Server.
|
|
|
|
- An unspecified error within 'Server: RBR' component of MySQL Server.","Checks if a vulnerable version is present
|
|
on the target host.
|
|
Details:
|
|
Oracle Mysql Security Update (cpuoct2018 - 01) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.814256)
|
|
Version used: 2023-11-04T00:10:08+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1588,DFN-CERT-2019-1152,DFN-CERT-2019-1047,DFN-CERT-2019-0484,DFN-CERT-2019-0112,DFN-CERT-2018-2273,DFN-CERT-2018-2110,WID-SEC-2023-1594,CB-K18/1005",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 04 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.810886,"CVE-2017-3452",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,901a8631-b4cd-458f-ae03-c413363f40cd,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to conduct denial-of-service attacks.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.35 and earlier on
|
|
Windows","The flaw exists due to some unspecified error
|
|
in the 'Server: Optimizer' component of application.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2017-3236618) 04 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.810886)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2017-1675,DFN-CERT-2017-0675,CB-K17/1604,CB-K17/0657",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2018-3678067) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.813144,"CVE-2018-2766,CVE-2018-2782,CVE-2018-2784,CVE-2018-2787,CVE-2018-2758",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b448c10a-4f65-4299-a3d5-d7b356bd99c9,"Successful exploitation of this
|
|
vulnerability will allow remote attackers to conduct a denial of service
|
|
condition and have an impact on integrity.","Apply the latest patch from vendor. Please see the references for more information.","Oracle MySQL versions 5.6.39 and earlier,
|
|
5.7.21 and earlier on Windows","Multiple flaws exist due to
|
|
|
|
- Multiple errors in 'InnoDB' component of the MySQL Server.
|
|
|
|
- An error in the 'Server:Security:Privileges' component of the MySQL Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2018-3678067) 02 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.813144)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0913,DFN-CERT-2018-0723,WID-SEC-2023-1594,CB-K18/0608",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 02 - Windows","Oracle MySQL is prone to multiple denial of service (DoS) vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.812646,"CVE-2018-2668,CVE-2018-2665,CVE-2018-2622,CVE-2018-2640",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b8356d73-0702-4b9c-ba94-f5c14270c5d9,"Successful exploitation of these vulnerabilities
|
|
will allow remote attackers to conduct a denial-of-service attack.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.58 and earlier,
|
|
5.6.38 and earlier, 5.7.20 and earlier on Windows","Multiple flaws exist due to:
|
|
|
|
- An error in the 'Server: DDL' component.
|
|
|
|
- Multiple errors in the 'Server: Optimizer' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jan2018-3236628) 02 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.812646)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0515,DFN-CERT-2018-0424,DFN-CERT-2018-0286,DFN-CERT-2018-0101,CB-K18/0480,CB-K18/0392,CB-K18/0265,CB-K18/0096",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 02 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811986,"CVE-2017-10378",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,45d5338a-7bf3-46c6-bbb0-d1b1ad259a21,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to compromise availability of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.57 and earlier,
|
|
5.6.37 and earlier, 5.7.11 and earlier on Windows.","The flaw exists due to an error in
|
|
'Server: Optimizer'","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (oct2017-3236626) 02 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811986)
|
|
Version used: 2023-07-25T13:05:58+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0515,DFN-CERT-2018-0260,DFN-CERT-2018-0242,DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K18/0480,CB-K18/0242,CB-K18/0224,CB-K17/2048,CB-K17/1748",""
|
|
192.168.8.77,,3306,tcp,6.5,Medium,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 04 - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811991,"CVE-2017-10379,CVE-2017-10384,CVE-2017-10268",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,44c9596a-feb2-4134-a88e-e39eb7a643e6,"Successful exploitation of this
|
|
vulnerability will allow remote to compromise availability confidentiality,
|
|
and integrity of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.57 and earlier,
|
|
5.6.37 and earlier, 5.7.19 and earlier on Windows.","Multiple flaws exist due to:
|
|
|
|
- An error in 'Client programs' component.
|
|
|
|
- An error in 'Server: DDL'.
|
|
|
|
- An error in 'Server: Replication'","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (oct2017-3236626) 04 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811991)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-1047,DFN-CERT-2018-1276,DFN-CERT-2018-1265,DFN-CERT-2018-0515,DFN-CERT-2018-0260,DFN-CERT-2018-0242,DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K18/0480,CB-K18/0242,CB-K18/0224,CB-K17/2048,CB-K17/1748",""
|
|
192.168.8.77,,3306,tcp,6.2,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Update (cpuoct2019) - Windows","Oracle MySQL Server is prone to a local unauthenticated vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.45
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.143032,"CVE-2019-2969",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1e9a6cda-1a16-4df7-9430-c07ae501c4f5,"","Update to version 5.6.45, 5.7.27, 8.0.17 or later.","Oracle MySQL Server versions 5.6.44 and prior, 5.7 through 5.7.26 and 8.0 through 8.0.16.","Easily exploitable vulnerability allows unauthenticated attacker with logon to
|
|
the infrastructure where MySQL Server executes to compromise MySQL Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.26 / 8.0 <= 8.0.16 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.143032)
|
|
Version used: 2021-09-08T16:01:40+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-2149,CB-K19/0915",""
|
|
192.168.8.77,,3306,tcp,6.1,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.47 / 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.807928,"CVE-2016-0649,CVE-2016-0650,CVE-2016-0644,CVE-2016-0646,CVE-2016-0640,CVE-2016-0641",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7b1e20d9-b22d-4ab5-93e8-fdce574ace9f,"Successful exploitation will allow an authenticated remote attacker to
|
|
affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.47 and prior, 5.6 through 5.6.28 and 5.7 through 5.7.10.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.47 / 5.6 <= 5.6.28 / 5.7 <= 5.7.10 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.807928)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0903,DFN-CERT-2016-0845,DFN-CERT-2016-0803,DFN-CERT-2016-0695,DFN-CERT-2016-0644,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0750,CB-K16/0646,CB-K16/0597",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpujul2023) - Windows","Oracle MySQL Server is prone to a unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.43
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149981,"CVE-2023-22053",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d9f13816-748f-476c-9397-7402ad16bce6,"","Update to version 5.7.43, 8.0.34 or later.","Oracle MySQL Server version 5.7.42 and prior and 8.x through
|
|
8.0.33.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.33 Security Update (cpujul2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149981)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-1188,DFN-CERT-2024-0593,DFN-CERT-2024-0491,DFN-CERT-2024-0454,DFN-CERT-2023-1642,WID-SEC-2024-1248,WID-SEC-2023-1794",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to a vulnerability in a third party library.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117194,"CVE-2015-7744",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,115607eb-db76-4a54-9cec-136964d6f278,"The flaw makes it easier for remote attackers to obtain private RSA
|
|
keys by capturing TLS handshakes, aka a Lenstra attack.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.45 and prior and 5.6 through 5.6.26.","wolfSSL (formerly CyaSSL) as used in MySQL does not properly handle
|
|
faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange
|
|
without low memory optimizations on a server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.45 / 5.6 <= 5.6.26 Security Update (cpujan2016) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117194)
|
|
Version used: 2022-08-31T18:10:28+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 06 - Windows","Oracle MySQL is prone to an information disclosure vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811440,"CVE-2017-3732",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9c371e4d-2f01-48b3-81f7-697cc1ee7d82,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to get sensitive information.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.35 and earlier,
|
|
5.7.17 and earlier on Windows","The flaw exists due to an error in
|
|
Security: Encryption (OpenSSL).","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jul2017-3236622) 06 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811440)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-0228,DFN-CERT-2018-1907,DFN-CERT-2018-1675,DFN-CERT-2018-1377,DFN-CERT-2018-1048,DFN-CERT-2018-1036,DFN-CERT-2018-0952,DFN-CERT-2018-0620,DFN-CERT-2018-0512,DFN-CERT-2018-0323,DFN-CERT-2018-0100,DFN-CERT-2018-0011,DFN-CERT-2017-1830,DFN-CERT-2017-1828,DFN-CERT-2017-1827,DFN-CERT-2017-1785,DFN-CERT-2017-1243,DFN-CERT-2017-1236,DFN-CERT-2017-0925,DFN-CERT-2017-0675,DFN-CERT-2017-0608,DFN-CERT-2017-0314,DFN-CERT-2017-0301,DFN-CERT-2017-0219,DFN-CERT-2017-0178,DFN-CERT-2017-0156,WID-SEC-2023-1594,WID-SEC-2022-1914,WID-SEC-2022-0673,CB-K22/0045,CB-K19/0354,CB-K18/0482,CB-K18/0296,CB-K18/0098,CB-K18/0006,CB-K17/1749,CB-K17/1748,CB-K17/1747,CB-K17/1709,CB-K17/1205,CB-K17/1198,CB-K17/0896,CB-K17/0657,CB-K17/0583,CB-K17/0307,CB-K17/0289,CB-K17/0214,CB-K17/0175,CB-K17/0153",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Update (cpuapr2019) - Windows","Oracle MySQL Server is prone to a vulnerability in the libmysqld subcomponent.","Installed version: 5.6.10
|
|
Fixed version: 5.6.43
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.142405,"CVE-2018-3123",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,28ebe0ad-d1c3-481e-abcb-c45d41901050,"","Update to version 5.6.43, 5.7.25, 8.0.14 or later.","Oracle MySQL Server versions 5.6.42 and prior, 5.7 through 5.7.24 and 8.0 through 8.0.13.","Difficult to exploit vulnerability allows unauthenticated attacker with
|
|
network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can
|
|
result in unauthorized access to critical data or complete access to all MySQL Server accessible data.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.42 / 5.7 <= 5.7.24 / 8.0 <= 8.0.13 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.142405)
|
|
Version used: 2021-09-07T22:01:38+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-0775,WID-SEC-2023-1594,CB-K19/0319",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpuapr2016v3) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.807924,"CVE-2016-0666,CVE-2016-0647,CVE-2016-0648,CVE-2016-0642,CVE-2016-0643,CVE-2016-2047",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d1921171-46ec-4b81-997c-57f84a86cadf,"Successful exploitation will allow remote users to affect confidentiality,
|
|
integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.11.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.807924)
|
|
Version used: 2023-11-03T13:05:46+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1204,DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0903,DFN-CERT-2016-0845,DFN-CERT-2016-0803,DFN-CERT-2016-0695,DFN-CERT-2016-0644,DFN-CERT-2016-0532,DFN-CERT-2016-0143,CB-K16/1129,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0750,CB-K16/0646,CB-K16/0597,CB-K16/0493,CB-K16/0133",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Backronym Vulnerability (Jun 2016) - Windows","Oracle MySQL is prone to the backronym vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.3
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808063,"CVE-2015-3152",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9c4376fe-2611-4be0-88d9-c6f815f0c965,"Successful exploitation will allow
|
|
man-in-the-middle attackers to spoof servers via a cleartext-downgrade
|
|
attack.","Upgrade to version Oracle MySQL Server 5.7.3 or
|
|
later.","Oracle MySQL Server 5.7.2 and earlier
|
|
on Windows.","The flaw exists due to improper validation
|
|
of MySQL client library when establishing a secure connection to a MySQL
|
|
server using the --ssl option.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Backronym Vulnerability (Jun 2016) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808063)
|
|
Version used: 2024-02-16T13:06:55+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1004,DFN-CERT-2015-1105,DFN-CERT-2015-1096,DFN-CERT-2015-1071,DFN-CERT-2015-1051,DFN-CERT-2015-1016,DFN-CERT-2015-0942,CB-K18/0871,CB-K16/0944,CB-K15/1045,CB-K15/1042,CB-K15/1020,CB-K15/0994,CB-K15/0964,CB-K15/0895",""
|
|
192.168.8.77,,3306,tcp,5.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.43 / 5.7 <= 5.7.25 / 8.0 <= 8.0.15 Security Update (cpuapr2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.44
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.142403,"CVE-2019-1559,CVE-2019-2683,CVE-2019-2627,CVE-2019-2614",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,523ebac0-0a2e-48df-89d8-cc143941eeaf,"","Update to version 5.6.44, 5.7.26, 8.0.16 or later.","Oracle MySQL Server versions 5.6.43 and prior, 5.7 through 5.7.25 and 8.0 through 8.0.15.","The attacks range in variety and difficulty. Most of them allow an attacker
|
|
with network access via multiple protocols to compromise the MySQL Server.
|
|
|
|
For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.43 / 5.7 <= 5.7.25 / 8.0 <= 8.0.15 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.142403)
|
|
Version used: 2022-03-28T11:06:01+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-2620,DFN-CERT-2020-2189,DFN-CERT-2020-2180,DFN-CERT-2020-0092,DFN-CERT-2020-0048,DFN-CERT-2019-2625,DFN-CERT-2019-2457,DFN-CERT-2019-2300,DFN-CERT-2019-2274,DFN-CERT-2019-2158,DFN-CERT-2019-2157,DFN-CERT-2019-2046,DFN-CERT-2019-2008,DFN-CERT-2019-1996,DFN-CERT-2019-1897,DFN-CERT-2019-1755,DFN-CERT-2019-1746,DFN-CERT-2019-1722,DFN-CERT-2019-1713,DFN-CERT-2019-1683,DFN-CERT-2019-1678,DFN-CERT-2019-1677,DFN-CERT-2019-1617,DFN-CERT-2019-1614,DFN-CERT-2019-1486,DFN-CERT-2019-1460,DFN-CERT-2019-1455,DFN-CERT-2019-1453,DFN-CERT-2019-1450,DFN-CERT-2019-1408,DFN-CERT-2019-1240,DFN-CERT-2019-0968,DFN-CERT-2019-0781,DFN-CERT-2019-0775,DFN-CERT-2019-0771,DFN-CERT-2019-0566,DFN-CERT-2019-0556,DFN-CERT-2019-0412,WID-SEC-2023-2946,WID-SEC-2023-1594,WID-SEC-2022-0673,WID-SEC-2022-0462,CB-K22/0045,CB-K20/0041,CB-K19/0911,CB-K19/0639,CB-K19/0623,CB-K19/0622,CB-K19/0620,CB-K19/0619,CB-K19/0615,CB-K19/0332,CB-K19/0320,CB-K19/0319,CB-K19/0173",""
|
|
192.168.8.77,,3306,tcp,5.8,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-05 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803727,"CVE-2013-3811,CVE-2013-3806,CVE-2013-3810,CVE-2013-3807,CVE-2013-3798,CVE-2013-3796,CVE-2013-3795",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,654cfb12-5a92-4805-831b-3d33b9b124f6,"Successful exploitation will allow remote authenticated users to affect
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.6.11 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to InnoDB, XA Transactions, Server Privileges, MemCached, Server Optimizer and Data Manipulation Language.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
MySQL Unspecified vulnerabilities-05 (Jul 2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.803727)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/0620",""
|
|
192.168.8.77,,3306,tcp,5.7,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-03 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805172,"CVE-2015-2571,CVE-2015-0505,CVE-2015-0501,CVE-2015-0499",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,78635e08-bb06-4eb5-a3f8-fa96e05ef36f,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.42 and earlier,
|
|
and 5.6.23 and earlier on windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to Server : Optimizer, DDL,
|
|
Server : Compiling, Server : Federated.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-03 (Apr 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805172)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1623,DFN-CERT-2015-1604,DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1105,DFN-CERT-2015-1096,DFN-CERT-2015-1016,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/1518,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1042,CB-K15/0964,CB-K15/0720,CB-K15/0531",""
|
|
192.168.8.232,,3718,tcp,5.3,Medium,80,"Mitigation","Weak Host Key Algorithm(s) (SSH)","The remote SSH server is configured to allow / support weak host
|
|
key algorithm(s).","The remote SSH server supports the following weak host key algorithm(s):
|
|
|
|
host key algorithm | Description
|
|
-----------------------------------------------------------------------------------------
|
|
ssh-dss | Digital Signature Algorithm (DSA) / Digital Signature Standard (DSS)
|
|
",1.3.6.1.4.1.25623.1.0.117687,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,3a8caedc-af78-46dd-ace3-92408a038dae,"","Disable the reported weak host key algorithm(s).","","","Checks the supported host key algorithms of the remote SSH
|
|
server.
|
|
|
|
Currently weak host key algorithms are defined as the following:
|
|
|
|
- ssh-dss: Digital Signature Algorithm (DSA) / Digital Signature Standard (DSS)
|
|
Details:
|
|
Weak Host Key Algorithm(s) (SSH)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117687)
|
|
Version used: 2023-10-12T13:05:32+08:00
|
|
","","","",""
|
|
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 Security Update (cpuoct2019) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.46
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.143034,"CVE-2019-2922,CVE-2019-2923,CVE-2019-2924,CVE-2019-2910",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0b923c30-431c-41dc-b028-4f8c86b8b3ab,"","Update to version 5.6.46, 5.7.28 or later.","Oracle MySQL Server versions 5.6.45 and prior and 5.7 through 5.7.27.","Oracle MySQL Server is prone to multiple vulnerabilities.
|
|
|
|
For further information refer to the official advisory via the referenced link.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.45 / 5.7 <= 5.7.27 Security Update (cpuoct2019) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.143034)
|
|
Version used: 2021-09-08T16:01:40+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2020-0103,DFN-CERT-2019-2149,CB-K19/0915",""
|
|
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.46 / 5.7 <= 5.7.26 Security Update (cpuapr2020) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities in OpenSSL.","Installed version: 5.6.10
|
|
Fixed version: 5.6.47
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.143735,"CVE-2019-1547,CVE-2019-1549,CVE-2019-1552,CVE-2019-1563",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e2866c53-fbc3-40cc-9f60-0d6b608cbd42,"","Update to version 5.6.47, 5.7.27 or later.","Oracle MySQL Server versions 5.6.46 and prior and 5.7 through 5.7.26.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.46 / 5.7 <= 5.7.26 Security Update (cpuapr2020) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.143735)
|
|
Version used: 2021-08-16T17:00:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-2709,DFN-CERT-2020-2014,DFN-CERT-2020-1729,DFN-CERT-2020-0895,DFN-CERT-2020-0776,DFN-CERT-2020-0775,DFN-CERT-2020-0772,DFN-CERT-2020-0716,DFN-CERT-2020-0277,DFN-CERT-2020-0101,DFN-CERT-2020-0096,DFN-CERT-2020-0091,DFN-CERT-2020-0090,DFN-CERT-2019-2164,DFN-CERT-2019-2149,DFN-CERT-2019-1900,DFN-CERT-2019-1897,DFN-CERT-2019-1559,WID-SEC-2023-3081,WID-SEC-2023-1762,WID-SEC-2023-1049,WID-SEC-2022-0673,CB-K22/0045,CB-K20/1049,CB-K20/1016,CB-K20/0321,CB-K20/0318,CB-K20/0043,CB-K20/0038,CB-K20/0036,CB-K20/0028,CB-K19/1025,CB-K19/0919,CB-K19/0915,CB-K19/0808,CB-K19/0675",""
|
|
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.30 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.40
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.118388,"CVE-2022-2097,CVE-2022-21617,CVE-2022-21608",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e39d58a6-cd20-461f-b857-1f0a7a9038b2,"","Update to version 5.7.40, 8.0.31 or later.","Oracle MySQL Server version 5.7.39 and prior and 8.0 through
|
|
8.0.30.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.30 Security Update (cpuoct2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.118388)
|
|
Version used: 2022-10-24T18:14:58+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0147,DFN-CERT-2023-2667,DFN-CERT-2023-2491,DFN-CERT-2023-1230,DFN-CERT-2023-1058,DFN-CERT-2023-0509,DFN-CERT-2023-0299,DFN-CERT-2023-0100,DFN-CERT-2022-2323,DFN-CERT-2022-2315,DFN-CERT-2022-2306,DFN-CERT-2022-2150,DFN-CERT-2022-2073,DFN-CERT-2022-2072,DFN-CERT-2022-1905,DFN-CERT-2022-1646,DFN-CERT-2022-1536,DFN-CERT-2022-1521,DFN-CERT-2022-1520,DFN-CERT-2022-1515,DFN-CERT-2022-1497,WID-SEC-2024-1186,WID-SEC-2024-0794,WID-SEC-2023-2031,WID-SEC-2023-1969,WID-SEC-2023-1432,WID-SEC-2022-1777,WID-SEC-2022-1776,WID-SEC-2022-1461,WID-SEC-2022-1245,WID-SEC-2022-1146,WID-SEC-2022-1068,WID-SEC-2022-1065,WID-SEC-2022-0561",""
|
|
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 02 - Windows","Oracle MySQL is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811432,"CVE-2017-3651,CVE-2017-3653,CVE-2017-3652,CVE-2017-3635,CVE-2017-3648,CVE-2017-3641",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,717fcf5b-9e74-4143-b8e8-372165449061,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to have an impact on confidentiality, integrity and
|
|
availability.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.56 and earlier,
|
|
5.6.36 and earlier, 5.7.18 and earlier, on Windows","Multiple flaws exist due to
|
|
|
|
- A flaw in the Client mysqldump component.
|
|
|
|
- A flaw in the Server: DDL component.
|
|
|
|
- A flaw in the C API component.
|
|
|
|
- A flaw in the Connector/C component.
|
|
|
|
- A flaw in the Server: Charsets component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jul2017-3236622) 02 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811432)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1956,DFN-CERT-2017-1806,DFN-CERT-2017-1675,DFN-CERT-2017-1519,DFN-CERT-2017-1465,DFN-CERT-2017-1341,DFN-CERT-2017-1282,DFN-CERT-2017-1243,CB-K18/0224,CB-K17/1870,CB-K17/1732,CB-K17/1604,CB-K17/1453,CB-K17/1401,CB-K17/1298,CB-K17/1239,CB-K17/1205",""
|
|
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle Mysql Security Updates (jul2017-3236622) 03 - Windows","Oracle MySQL is prone to vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811434,"CVE-2017-3636",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b6e51401-7e7d-48e6-a25b-2e0a37093458,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to partially access data, partially modify data,
|
|
and partially deny service.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.56 and earlier,
|
|
5.6.36 and earlier, on Windows","The flaw exists due to an error in the Client
|
|
programs component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jul2017-3236622) 03 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811434)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-1276,DFN-CERT-2018-0242,DFN-CERT-2017-1956,DFN-CERT-2017-1675,DFN-CERT-2017-1519,DFN-CERT-2017-1465,DFN-CERT-2017-1282,DFN-CERT-2017-1243,CB-K18/0224,CB-K17/1870,CB-K17/1604,CB-K17/1453,CB-K17/1401,CB-K17/1239,CB-K17/1205",""
|
|
192.168.8.77,,3306,tcp,5.3,Medium,80,"VendorFix","Oracle Mysql Security Updates (apr2017-3236618) 03 - Windows","Oracle MySQL is prone to a security bypass vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.810884,"CVE-2017-3305",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6cf7359a-d9b1-4b2a-9f32-23a2feb4def0,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to bypass certain security restrictions and perform
|
|
unauthorized actions by conducting a man-in-the-middle attack. This may lead to
|
|
other attacks also.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.54 and earlier,
|
|
5.6.35 and earlier on Windows","The flaw exists due to an incorrect
|
|
implementation or enforcement of 'ssl-mode=REQUIRED' in MySQL.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (apr2017-3236618) 03 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.810884)
|
|
Version used: 2023-07-25T13:05:58+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2017-1675,DFN-CERT-2017-1282,DFN-CERT-2017-0675,CB-K17/1604,CB-K17/1239,CB-K17/0657",""
|
|
192.168.8.77,,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
|
|
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:
|
|
|
|
Port: 49664/tcp
|
|
|
|
UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49664]
|
|
|
|
Port: 49665/tcp
|
|
|
|
UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49665]
|
|
Annotation: Event log TCPIP
|
|
|
|
Port: 49666/tcp
|
|
|
|
UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49666]
|
|
|
|
UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49666]
|
|
|
|
Port: 49667/tcp
|
|
|
|
UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]
|
|
|
|
UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]
|
|
Named pipe : spoolss
|
|
Win32 service or process : spoolsv.exe
|
|
Description : Spooler service
|
|
|
|
UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]
|
|
|
|
UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]
|
|
|
|
UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49667]
|
|
|
|
Port: 49669/tcp
|
|
|
|
UUID: 6b5bdd1e-528c-422c-af8c-a4079be4fe48, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49669]
|
|
Annotation: Remote Fw APIs
|
|
|
|
Port: 49670/tcp
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : SAM access
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49670]
|
|
Annotation: KeyIso
|
|
|
|
Port: 49754/tcp
|
|
|
|
UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.77[49754]
|
|
|
|
Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
|
|
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c1832f51-4ddd-4946-8df8-4846fca431cd,"An attacker may use this fact to gain more knowledge
|
|
about the remote host.","Filter incoming traffic to this ports.","","","
|
|
Details:
|
|
DCE/RPC and MSRPC Services Enumeration Reporting
|
|
(OID: 1.3.6.1.4.1.25623.1.0.10736)
|
|
Version used: 2022-06-03T18:17:07+08:00
|
|
","","","",""
|
|
192.168.8.84,,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
|
|
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:
|
|
|
|
Port: 49664/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : SAM access
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49664]
|
|
Annotation: KeyIso
|
|
|
|
Port: 49665/tcp
|
|
|
|
UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49665]
|
|
|
|
Port: 49666/tcp
|
|
|
|
UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49666]
|
|
Annotation: Event log TCPIP
|
|
|
|
Port: 49667/tcp
|
|
|
|
UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49667]
|
|
|
|
UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49667]
|
|
|
|
Port: 49669/tcp
|
|
|
|
UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]
|
|
|
|
UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]
|
|
Named pipe : spoolss
|
|
Win32 service or process : spoolsv.exe
|
|
Description : Spooler service
|
|
|
|
UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]
|
|
|
|
UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]
|
|
|
|
UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49669]
|
|
|
|
Port: 49670/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49670]
|
|
Annotation: KeyIso
|
|
|
|
Port: 49694/tcp
|
|
|
|
UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.84[49694]
|
|
|
|
Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
|
|
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f75c3cef-9c64-4989-a59d-d732ef073c3f,"An attacker may use this fact to gain more knowledge
|
|
about the remote host.","Filter incoming traffic to this ports.","","","
|
|
Details:
|
|
DCE/RPC and MSRPC Services Enumeration Reporting
|
|
(OID: 1.3.6.1.4.1.25623.1.0.10736)
|
|
Version used: 2022-06-03T18:17:07+08:00
|
|
","","","",""
|
|
192.168.8.77,,3306,tcp,5.0,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-03 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803725,"CVE-2013-3801,CVE-2013-3805,CVE-2013-3794",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,345a020e-cb59-440e-96f2-1fe12308cba5,"Successful exploitation will allow remote authenticated users to affect
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.5.30 and earlier and 5.6.10 on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Prepared Statements, Server Options and Server Partition.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
MySQL Unspecified vulnerabilities-03 (Jul 2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.803725)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-1937,DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/0919,CB-K13/0620",""
|
|
192.168.8.85,yilan950502.tahoho.com.tw,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
|
|
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:
|
|
|
|
Port: 49664/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : SAM access
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49664]
|
|
Annotation: KeyIso
|
|
|
|
Port: 49665/tcp
|
|
|
|
UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49665]
|
|
|
|
Port: 49666/tcp
|
|
|
|
UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49666]
|
|
|
|
UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49666]
|
|
|
|
Port: 49667/tcp
|
|
|
|
UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49667]
|
|
Annotation: Windows Event Log
|
|
|
|
Port: 49668/tcp
|
|
|
|
UUID: 29770a8f-829b-4158-90a2-78cd488501f7, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49668]
|
|
|
|
Port: 49673/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49673]
|
|
Annotation: KeyIso
|
|
|
|
Port: 49694/tcp
|
|
|
|
UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[49694]
|
|
|
|
Port: 60083/tcp
|
|
|
|
UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]
|
|
|
|
UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]
|
|
Named pipe : spoolss
|
|
Win32 service or process : spoolsv.exe
|
|
Description : Spooler service
|
|
|
|
UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]
|
|
|
|
UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]
|
|
|
|
UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.85[60083]
|
|
|
|
Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
|
|
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,cd6d71e4-4088-4056-963e-88c518972c49,"An attacker may use this fact to gain more knowledge
|
|
about the remote host.","Filter incoming traffic to this ports.","","","
|
|
Details:
|
|
DCE/RPC and MSRPC Services Enumeration Reporting
|
|
(OID: 1.3.6.1.4.1.25623.1.0.10736)
|
|
Version used: 2022-06-03T18:17:07+08:00
|
|
","","","",""
|
|
192.168.8.111,,135,tcp,5.0,Medium,80,"Mitigation","DCE/RPC and MSRPC Services Enumeration Reporting","Distributed Computing Environment / Remote Procedure Calls (DCE/RPC) or MSRPC services running
|
|
on the remote host can be enumerated by connecting on port 135 and doing the appropriate queries.","Here is the list of DCE/RPC or MSRPC services running on this host via the TCP protocol:
|
|
|
|
Port: 49664/tcp
|
|
|
|
UUID: d95afe70-a6d5-4259-822e-2c84da1ddb0d, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49664]
|
|
|
|
Port: 49665/tcp
|
|
|
|
UUID: 3c4728c5-f0ab-448b-bda1-6ce01eb0a6d5, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]
|
|
Annotation: DHCP Client LRPC Endpoint
|
|
|
|
UUID: a500d4c6-0dd1-4543-bc0c-d5f93486eaf8, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]
|
|
|
|
UUID: d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]
|
|
|
|
UUID: f6beaff7-1e19-4fbb-9f8f-b89e2018337c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49665]
|
|
Annotation: Event log TCPIP
|
|
|
|
Port: 49666/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 12345678-1234-abcd-ef00-01234567cffb, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Named pipe : lsass
|
|
Win32 service or process : Netlogon
|
|
Description : Net Logon service
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ab, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : LSA access
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : SAM access
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Annotation: KeyIso
|
|
|
|
UUID: c9ac6db5-82b7-4e55-ae8a-e464ed7b4277, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Annotation: Impl friendly name
|
|
|
|
UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49666]
|
|
Annotation: MS NT Directory DRS Interface
|
|
|
|
Port: 49667/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 12345678-1234-abcd-ef00-01234567cffb, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Named pipe : lsass
|
|
Win32 service or process : Netlogon
|
|
Description : Net Logon service
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ab, version 0
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : LSA access
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ac, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : SAM access
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Annotation: KeyIso
|
|
|
|
UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49667]
|
|
Annotation: MS NT Directory DRS Interface
|
|
|
|
Port: 49669/tcp
|
|
|
|
UUID: 0b1c2170-5732-4e0e-8cd3-d9b16f3b84d7, version 0
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Annotation: RemoteAccessCheck
|
|
|
|
UUID: 12345678-1234-abcd-ef00-01234567cffb, version 1
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Named pipe : lsass
|
|
Win32 service or process : Netlogon
|
|
Description : Net Logon service
|
|
|
|
UUID: 12345778-1234-abcd-ef00-0123456789ab, version 0
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Named pipe : lsass
|
|
Win32 service or process : lsass.exe
|
|
Description : LSA access
|
|
|
|
UUID: 51a227ae-825b-41f2-b4a9-1ac9557a1018, version 1
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: 8fb74744-b2ff-4c00-be0d-9ef9a191fe1b, version 1
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Annotation: Ngc Pop Key Service
|
|
|
|
UUID: b25a52bf-e5dd-4f4a-aea6-8ca7272a0e86, version 2
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Annotation: KeyIso
|
|
|
|
UUID: e3514235-4b06-11d1-ab04-00c04fc2dcd2, version 4
|
|
Endpoint: ncacn_http:192.168.8.111[49669]
|
|
Annotation: MS NT Directory DRS Interface
|
|
|
|
Port: 49670/tcp
|
|
|
|
UUID: 0d3c7f20-1c8d-4654-a1b3-51563b298bda, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: UserMgrCli
|
|
|
|
UUID: 201ef99a-7fa0-444c-9399-19ba84f12a1a, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: AppInfo
|
|
|
|
UUID: 3a9ef155-691d-4449-8d05-09ad57031823, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
|
|
UUID: 58e604e8-9adb-4d2e-a464-3b0683fb1480, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: AppInfo
|
|
|
|
UUID: 5f54ce7d-5b79-4175-8584-cb65313a0e98, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: AppInfo
|
|
|
|
UUID: 86d35949-83c9-4044-b424-db363231fd0c, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
|
|
UUID: a398e520-d59a-4bdd-aa7a-3c1e0303a511, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: IKE/Authip API
|
|
|
|
UUID: b18fbab6-56f8-4702-84e0-41053293a869, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: UserMgrCli
|
|
|
|
UUID: d09bdeb5-6171-4a34-bfe2-06fa82652568, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
|
|
UUID: fb9a3757-cff0-4db0-b9fc-bd6c131612fd, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: AppInfo
|
|
|
|
UUID: fd7a0523-dc70-43dd-9b2e-9c5ed48225b1, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49670]
|
|
Annotation: AppInfo
|
|
|
|
Port: 49687/tcp
|
|
|
|
UUID: 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]
|
|
|
|
UUID: 12345678-1234-abcd-ef00-0123456789ab, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]
|
|
Named pipe : spoolss
|
|
Win32 service or process : spoolsv.exe
|
|
Description : Spooler service
|
|
|
|
UUID: 4a452661-8290-4b36-8fbe-7f4093a94978, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]
|
|
|
|
UUID: 76f03f96-cdfd-44fc-a22c-64950a001209, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]
|
|
|
|
UUID: ae33069b-a2a8-46ee-a235-ddfd339be281, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49687]
|
|
|
|
Port: 49705/tcp
|
|
|
|
UUID: 367abb81-9844-35f1-ad32-98f038001003, version 2
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49705]
|
|
|
|
Port: 49731/tcp
|
|
|
|
UUID: 50abc2a4-574d-40b3-9d66-ee4fd5fba076, version 5
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49731]
|
|
Named pipe : dnsserver
|
|
Win32 service or process : dns.exe
|
|
Description : DNS Server
|
|
|
|
Port: 49801/tcp
|
|
|
|
UUID: 897e2e5f-93f3-4376-9c9c-fd2277495c27, version 1
|
|
Endpoint: ncacn_ip_tcp:192.168.8.111[49801]
|
|
Annotation: Frs2 Service
|
|
|
|
Note: DCE/RPC or MSRPC services running on this host locally were identified. Reporting this list is not enabled by default due to the possible large size of this list. See the script preferences to enable this reporting.
|
|
",1.3.6.1.4.1.25623.1.0.10736,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ffce65e4-0015-4563-8ab3-2284cf5ebba1,"An attacker may use this fact to gain more knowledge
|
|
about the remote host.","Filter incoming traffic to this ports.","","","
|
|
Details:
|
|
DCE/RPC and MSRPC Services Enumeration Reporting
|
|
(OID: 1.3.6.1.4.1.25623.1.0.10736)
|
|
Version used: 2022-06-03T18:17:07+08:00
|
|
","","","",""
|
|
192.168.8.77,,3306,tcp,5.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-02 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805171,"CVE-2015-2573,CVE-2015-2568,CVE-2015-0441,CVE-2015-0433",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a322cad9-44e3-4bd1-831d-a272e4d16ee2,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.41 and earlier,
|
|
and 5.6.22 and earlier on windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to DDL, Server : Security : Privileges,
|
|
Server : Security : Encryption, InnoDB : DML.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-02 (Apr 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805171)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1623,DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1105,DFN-CERT-2015-1096,DFN-CERT-2015-1016,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1042,CB-K15/0964,CB-K15/0720,CB-K15/0531",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.32 / 8.0 <= 8.0.22 Security Update (cpujan2021) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.51
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145224,"CVE-2021-2022,CVE-2021-2060",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,91c090da-1551-4c79-ac3e-6d851881fe09,"","Update to version 5.6.51, 5.7.33, 8.0.23 or later.","Oracle MySQL Server versions 5.6.50 and prior, 5.7 through 5.7.32 and 8.0 through 8.0.22.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.32 / 8.0 <= 8.0.22 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145224)
|
|
Version used: 2021-08-26T21:01:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-2155,DFN-CERT-2021-0131,WID-SEC-2023-0067,CB-K21/0062",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle Mysql Security Updates (oct2017-3236626) 07 - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.811997,"CVE-2017-10279",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f3a38c66-f2b2-4da2-ba0c-8e1061ed0fe4,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to compromise on availability of the system.","Apply the patch from the referenced advisory.","Oracle MySQL version
|
|
5.6.36 and earlier, 5.7.18 and earlier on Windows.","The flaw exists due to an error in
|
|
'Server: Optimizer' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (oct2017-3236626) 07 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.811997)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2017-2137,DFN-CERT-2017-1827,CB-K17/2048,CB-K17/1748",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpujan2021) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.51
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145222,"CVE-2021-2001",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a622115b-38cb-4326-a656-cd6e4a79bf39,"Successful attacks of this vulnerability can result in the unauthorized ability
|
|
to cause a hang or frequently repeatedly crash (complete DOS) the MySQL Server.","Update to version 5.6.51, 5.7.31, 8.0.18 or later.","Oracle MySQL Server versions 5.6.50 and prior, 5.7 through 5.7.30 and 8.0 through 8.0.17.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.50 / 5.7 <= 5.7.30 / 8.0 <= 8.0.17 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145222)
|
|
Version used: 2021-08-26T21:01:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-2155,DFN-CERT-2021-0810,DFN-CERT-2021-0131,WID-SEC-2023-0067,CB-K21/0062",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle Mysql Security Updates (jan2018-3236628) 05 - Windows","Oracle MySQL is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.812652,"CVE-2018-2591",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c1514512-2375-4c8a-83d2-05bac53b5f40,"Successful exploitation of this vulnerability
|
|
will allow remote attackers to conduct a denial-of-service attack.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.38 and earlier,
|
|
5.7.19 and earlier on Windows","The flaw exists due to an error in the
|
|
'Server : Partition' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle Mysql Security Updates (jan2018-3236628) 05 - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.812652)
|
|
Version used: 2024-02-29T22:37:57+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2018-0101,CB-K18/0096",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.31
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145804,"CVE-2021-2160",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f4a5be67-a937-46f2-8890-e2f114822082,"","Update to version 5.7.31, 8.0.18 or later.","Oracle MySQL Server version 5.7.30 and prior and 8.0 through 8.0.17.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.30 / 8.0 <= 8.0.17 Security Update (cpuapr2021) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145804)
|
|
Version used: 2021-08-26T21:01:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2021-0821,WID-SEC-2023-0065,CB-K21/0421",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.33 Security Update (cpuapr2021) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.34
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.145802,"CVE-2021-2154",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fa6fe2a6-e1b3-47f1-acb0-0eee2e073338,"","Update to version 5.7.34 or later.","Oracle MySQL Server version 5.7.33 and prior.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.33 Security Update (cpuapr2021) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.145802)
|
|
Version used: 2021-08-26T21:01:12+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-1241,DFN-CERT-2022-0933,DFN-CERT-2022-0666,DFN-CERT-2021-1660,DFN-CERT-2021-0984,DFN-CERT-2021-0821,WID-SEC-2023-0065,CB-K21/0421",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.40 Security Update (cpujan2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
|
|
vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.41
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149168,"CVE-2023-21840",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0980fbb1-a224-4cce-ae36-067ba914aa9c,"","Update to version 5.7.41 or later.","Oracle MySQL Server version 5.7.40 and prior.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.40 Security Update (cpujan2023) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149168)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-0105,WID-SEC-2023-1424,WID-SEC-2023-0126",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809370,"CVE-2016-5507",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f9ffd31b-9fc7-40b6-a4de-d13a748af363,"Successful exploitation of this vulnerability will allow remote
|
|
attackers to cause a denial of service.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.32 and 5.7 through 5.7.14.","The flaw exists due to an unspecified vulnerability.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.32 / 5.7 <= 5.7.14 Security Update (cpuoct201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809370)
|
|
Version used: 2022-08-29T18:21:34+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1624",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.31 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to multiple vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.7.43
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.151212,"CVE-2023-22015,CVE-2023-22026",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,86cd7fa0-2aba-4855-afec-d97f17b6fd7c,"","Update to version 5.7.43, 8.0.32 or later.","Oracle MySQL Server version 5.7.42 and prior and 8.x through
|
|
8.0.31.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.42, 8.x <= 8.0.31 Security Update (cpuoct2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.151212)
|
|
Version used: 2023-10-20T13:06:03+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-2536,WID-SEC-2023-2690",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpujul2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
|
|
vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.42
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149979,"CVE-2023-22007",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e7ae81bc-89d7-46cc-bb13-10076f79dd88,"","Update to version 5.7.42, 8.0.33 or later.","Oracle MySQL Server version 5.7.41 and prior and 8.x through
|
|
8.0.32.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.41, 8.x <= 8.0.32 Security Update (cpujul2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149979)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-1188,DFN-CERT-2024-0593,DFN-CERT-2024-0454,DFN-CERT-2023-1642,WID-SEC-2023-1794",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.31 Security Update (cpuoct2023) - Windows","Oracle MySQL Server is prone to denial of service (DoS)
|
|
vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.44
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.151216,"CVE-2023-22028",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0d5549a7-7d89-40b9-9d7d-607a7e1e7131,"","Update to version 5.7.44, 8.0.32 or later.","Oracle MySQL Server version 5.7.43 and prior and 8.x through
|
|
8.0.31.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.43, 8.x <= 8.0.31 Security Update (cpuoct2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.151216)
|
|
Version used: 2023-10-20T13:06:03+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2024-0108,DFN-CERT-2023-2536,WID-SEC-2023-2690",""
|
|
192.168.8.77,,3306,tcp,4.9,Medium,80,"VendorFix","Oracle MySQL Server Component Replication Unspecified vulnerability (Oct 2013) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804034,"CVE-2013-5807",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,da5af193-3fff-4814-856f-593d1b7b2dee,"Successful exploitation will allow remote attackers to disclose sensitive
|
|
information, manipulate certain data, cause a DoS (Denial of Service) and
|
|
bypass certain security restrictions.","Apply the patch from the referenced advisory.","Oracle MySQL versions 5.5.10 through 5.5.32 and 5.6.x through 5.6.12 on Windows","Unspecified error in the MySQL Server component via unknown vectors related
|
|
to Replication.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server Component 'Replication' Unspecified vulnerability (Oct 2...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804034)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0190,DFN-CERT-2013-2099,DFN-CERT-2013-1846,DFN-CERT-2013-1795,CB-K14/0187,CB-K13/1072,CB-K13/0840,CB-K13/0789",""
|
|
192.168.8.230,,80,tcp,4.8,Medium,80,"Workaround","Cleartext Transmission of Sensitive Information via HTTP","The host / application transmits sensitive information (username, passwords) in
|
|
cleartext via HTTP.","The following input fields were identified (URL:input name):
|
|
|
|
http://192.168.8.230/:PD
|
|
",1.3.6.1.4.1.25623.1.0.108440,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e1f1c768-8449-40af-8129-17ad3b558a76,"An attacker could use this situation to compromise or eavesdrop on the
|
|
HTTP communication between the client and the server using a man-in-the-middle attack to get access to
|
|
sensitive data like usernames or passwords.","Enforce the transmission of sensitive data via an encrypted SSL/TLS connection.
|
|
Additionally make sure the host / application is redirecting all users to the secured SSL/TLS connection before
|
|
allowing to input sensitive data into the mentioned functions.","Hosts / applications which doesn't enforce the transmission of sensitive data via an
|
|
encrypted SSL/TLS connection.","","Evaluate previous collected information and check if the host / application is not
|
|
enforcing the transmission of sensitive data via an encrypted SSL/TLS connection.
|
|
|
|
The script is currently checking the following:
|
|
|
|
- HTTP Basic Authentication (Basic Auth)
|
|
|
|
- HTTP Forms (e.g. Login) with input field of type 'password'
|
|
Details:
|
|
Cleartext Transmission of Sensitive Information via HTTP
|
|
(OID: 1.3.6.1.4.1.25623.1.0.108440)
|
|
Version used: 2023-09-07T13:05:21+08:00
|
|
","","","",""
|
|
192.168.8.77,,3306,tcp,4.6,Medium,80,"VendorFix","Oracle MySQL Server 5.5 <= 5.5.29 / 5.6 <= 5.6.11 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.11
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117213,"CVE-2013-1523",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,dcd3b021-2238-44fe-ae1b-b10ce3680d37,"","Update to version 5.5.30, 5.6.11 or later.","Oracle MySQL Server versions 5.5 through 5.5.29 and 5.6 through 5.6.10.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.5 <= 5.5.29 / 5.6 <= 5.6.11 Security Update (cpuapr201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117213)
|
|
Version used: 2021-02-12T19:09:59+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-0798",""
|
|
192.168.8.77,,3306,tcp,4.4,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to a denial of service (DoS) vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.37
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.118382,"CVE-2022-21595",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0fd0c596-059f-47cb-80e8-81dd55797df3,"","Update to version 5.7.37, 8.0.28 or later.","Oracle MySQL Server version 5.7.36 and prior and 8.0 through
|
|
8.0.27.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.36 / 8.0 <= 8.0.27 Security Update (cpuoct2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.118382)
|
|
Version used: 2023-10-19T13:05:21+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-0504,DFN-CERT-2022-2306,WID-SEC-2022-1776",""
|
|
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.21 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.806855,"CVE-2016-0594",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c0e714a3-311e-4d60-82d9-649f6b6484bc,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.21.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.21 Security Update (cpujan2016) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.806855)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.16 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to an information disclosure vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.40
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.118384,"CVE-2022-21589",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1db0ae7f-7dec-4257-847a-d253933e269d,"","Update to version 5.7.40, 8.0.17 or later.","Oracle MySQL Server version 5.7.39 and prior and 8.0 through
|
|
8.0.16.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.16 Security Update (cpuoct2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.118384)
|
|
Version used: 2023-10-19T13:05:21+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-2306,WID-SEC-2023-2031,WID-SEC-2022-1776",""
|
|
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.29 Security Update (cpuoct2022) - Windows","Oracle MySQL Server is prone to an information disclosure vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.40
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.118386,"CVE-2022-21592",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,09a54547-805f-453c-bad5-6262933f3566,"","Update to version 5.7.40, 8.0.30 or later.","Oracle MySQL Server version 5.7.39 and prior and 8.0 through
|
|
8.0.29.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.39 / 8.0 <= 8.0.29 Security Update (cpuoct2022) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.118386)
|
|
Version used: 2023-10-19T13:05:21+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2022-2306,WID-SEC-2023-2031,WID-SEC-2022-1776",""
|
|
192.168.8.77,,3306,tcp,4.3,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Jul 2015)","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805930,"CVE-2015-4737,CVE-2015-2620",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,8b11c21f-0b88-49bb-a8e9-e81ebe051449,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.43 and earlier
|
|
and 5.6.23 and earlier on Windows","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server : Pluggable Auth and
|
|
Server : Security : Privileges.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Jul 2015)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805930)
|
|
Version used: 2024-02-20T13:05:48+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1604,DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1096,DFN-CERT-2015-1071,CB-K15/1518,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1020",""
|
|
192.168.8.111,,443,tcp,4.3,Medium,98,"Mitigation","SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection","It was possible to detect the usage of the deprecated TLSv1.0
|
|
and/or TLSv1.1 protocol on this system.","In addition to TLSv1.2+ the service is also providing the deprecated TLSv1.0 and TLSv1.1 protocols and supports one or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.802067) VT.
|
|
",1.3.6.1.4.1.25623.1.0.117274,"CVE-2011-3389,CVE-2015-0204",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1417983f-7e71-46f8-881e-ae9e9e9d690d,"An attacker might be able to use the known cryptographic flaws
|
|
to eavesdrop the connection between clients and the service to get access to sensitive data
|
|
transferred within the secured connection.
|
|
|
|
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
|
|
anymore.","It is recommended to disable the deprecated TLSv1.0 and/or
|
|
TLSv1.1 protocols in favor of the TLSv1.2+ protocols. Please see the references for more
|
|
information.","All services providing an encrypted communication using the
|
|
TLSv1.0 and/or TLSv1.1 protocols.","The TLSv1.0 and TLSv1.1 protocols contain known cryptographic
|
|
flaws like:
|
|
|
|
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
|
|
|
|
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded Legacy
|
|
Encryption (FREAK)","Check the used TLS protocols of the services provided by this
|
|
system.
|
|
Details:
|
|
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117274)
|
|
Version used: 2023-10-21T00:09:12+08:00
|
|
","","","DFN-CERT-2020-0177,DFN-CERT-2020-0111,DFN-CERT-2019-0068,DFN-CERT-2018-1441,DFN-CERT-2018-1408,DFN-CERT-2016-1372,DFN-CERT-2016-1164,DFN-CERT-2016-0388,DFN-CERT-2015-1853,DFN-CERT-2015-1332,DFN-CERT-2015-0884,DFN-CERT-2015-0800,DFN-CERT-2015-0758,DFN-CERT-2015-0567,DFN-CERT-2015-0544,DFN-CERT-2015-0530,DFN-CERT-2015-0396,DFN-CERT-2015-0375,DFN-CERT-2015-0374,DFN-CERT-2015-0305,DFN-CERT-2015-0199,DFN-CERT-2015-0079,DFN-CERT-2015-0021,DFN-CERT-2014-1414,DFN-CERT-2013-1847,DFN-CERT-2013-1792,DFN-CERT-2012-1979,DFN-CERT-2012-1829,DFN-CERT-2012-1530,DFN-CERT-2012-1380,DFN-CERT-2012-1377,DFN-CERT-2012-1292,DFN-CERT-2012-1214,DFN-CERT-2012-1213,DFN-CERT-2012-1180,DFN-CERT-2012-1156,DFN-CERT-2012-1155,DFN-CERT-2012-1039,DFN-CERT-2012-0956,DFN-CERT-2012-0908,DFN-CERT-2012-0868,DFN-CERT-2012-0867,DFN-CERT-2012-0848,DFN-CERT-2012-0838,DFN-CERT-2012-0776,DFN-CERT-2012-0722,DFN-CERT-2012-0638,DFN-CERT-2012-0627,DFN-CERT-2012-0451,DFN-CERT-2012-0418,DFN-CERT-2012-0354,DFN-CERT-2012-0234,DFN-CERT-2012-0221,DFN-CERT-2012-0177,DFN-CERT-2012-0170,DFN-CERT-2012-0146,DFN-CERT-2012-0142,DFN-CERT-2012-0126,DFN-CERT-2012-0123,DFN-CERT-2012-0095,DFN-CERT-2012-0051,DFN-CERT-2012-0047,DFN-CERT-2012-0021,DFN-CERT-2011-1953,DFN-CERT-2011-1946,DFN-CERT-2011-1844,DFN-CERT-2011-1826,DFN-CERT-2011-1774,DFN-CERT-2011-1743,DFN-CERT-2011-1738,DFN-CERT-2011-1706,DFN-CERT-2011-1628,DFN-CERT-2011-1627,DFN-CERT-2011-1619,DFN-CERT-2011-1482,WID-SEC-2023-1435,CB-K18/0799,CB-K16/1289,CB-K16/1096,CB-K15/1751,CB-K15/1266,CB-K15/0850,CB-K15/0764,CB-K15/0720,CB-K15/0548,CB-K15/0526,CB-K15/0509,CB-K15/0493,CB-K15/0384,CB-K15/0365,CB-K15/0364,CB-K15/0302,CB-K15/0192,CB-K15/0079,CB-K15/0016,CB-K14/1342,CB-K14/0231,CB-K13/0845,CB-K13/0796,CB-K13/0790",""
|
|
192.168.8.111,,8445,tcp,4.3,Medium,98,"Mitigation","SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection","It was possible to detect the usage of the deprecated TLSv1.0
|
|
and/or TLSv1.1 protocol on this system.","In addition to TLSv1.2+ the service is also providing the deprecated TLSv1.0 and TLSv1.1 protocols and supports one or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.802067) VT.
|
|
",1.3.6.1.4.1.25623.1.0.117274,"CVE-2011-3389,CVE-2015-0204",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f9aa6866-9fa1-4d6b-8719-0212d887398c,"An attacker might be able to use the known cryptographic flaws
|
|
to eavesdrop the connection between clients and the service to get access to sensitive data
|
|
transferred within the secured connection.
|
|
|
|
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
|
|
anymore.","It is recommended to disable the deprecated TLSv1.0 and/or
|
|
TLSv1.1 protocols in favor of the TLSv1.2+ protocols. Please see the references for more
|
|
information.","All services providing an encrypted communication using the
|
|
TLSv1.0 and/or TLSv1.1 protocols.","The TLSv1.0 and TLSv1.1 protocols contain known cryptographic
|
|
flaws like:
|
|
|
|
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
|
|
|
|
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded Legacy
|
|
Encryption (FREAK)","Check the used TLS protocols of the services provided by this
|
|
system.
|
|
Details:
|
|
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117274)
|
|
Version used: 2023-10-21T00:09:12+08:00
|
|
","","","DFN-CERT-2020-0177,DFN-CERT-2020-0111,DFN-CERT-2019-0068,DFN-CERT-2018-1441,DFN-CERT-2018-1408,DFN-CERT-2016-1372,DFN-CERT-2016-1164,DFN-CERT-2016-0388,DFN-CERT-2015-1853,DFN-CERT-2015-1332,DFN-CERT-2015-0884,DFN-CERT-2015-0800,DFN-CERT-2015-0758,DFN-CERT-2015-0567,DFN-CERT-2015-0544,DFN-CERT-2015-0530,DFN-CERT-2015-0396,DFN-CERT-2015-0375,DFN-CERT-2015-0374,DFN-CERT-2015-0305,DFN-CERT-2015-0199,DFN-CERT-2015-0079,DFN-CERT-2015-0021,DFN-CERT-2014-1414,DFN-CERT-2013-1847,DFN-CERT-2013-1792,DFN-CERT-2012-1979,DFN-CERT-2012-1829,DFN-CERT-2012-1530,DFN-CERT-2012-1380,DFN-CERT-2012-1377,DFN-CERT-2012-1292,DFN-CERT-2012-1214,DFN-CERT-2012-1213,DFN-CERT-2012-1180,DFN-CERT-2012-1156,DFN-CERT-2012-1155,DFN-CERT-2012-1039,DFN-CERT-2012-0956,DFN-CERT-2012-0908,DFN-CERT-2012-0868,DFN-CERT-2012-0867,DFN-CERT-2012-0848,DFN-CERT-2012-0838,DFN-CERT-2012-0776,DFN-CERT-2012-0722,DFN-CERT-2012-0638,DFN-CERT-2012-0627,DFN-CERT-2012-0451,DFN-CERT-2012-0418,DFN-CERT-2012-0354,DFN-CERT-2012-0234,DFN-CERT-2012-0221,DFN-CERT-2012-0177,DFN-CERT-2012-0170,DFN-CERT-2012-0146,DFN-CERT-2012-0142,DFN-CERT-2012-0126,DFN-CERT-2012-0123,DFN-CERT-2012-0095,DFN-CERT-2012-0051,DFN-CERT-2012-0047,DFN-CERT-2012-0021,DFN-CERT-2011-1953,DFN-CERT-2011-1946,DFN-CERT-2011-1844,DFN-CERT-2011-1826,DFN-CERT-2011-1774,DFN-CERT-2011-1743,DFN-CERT-2011-1738,DFN-CERT-2011-1706,DFN-CERT-2011-1628,DFN-CERT-2011-1627,DFN-CERT-2011-1619,DFN-CERT-2011-1482,WID-SEC-2023-1435,CB-K18/0799,CB-K16/1289,CB-K16/1096,CB-K15/1751,CB-K15/1266,CB-K15/0850,CB-K15/0764,CB-K15/0720,CB-K15/0548,CB-K15/0526,CB-K15/0509,CB-K15/0493,CB-K15/0384,CB-K15/0365,CB-K15/0364,CB-K15/0302,CB-K15/0192,CB-K15/0079,CB-K15/0016,CB-K14/1342,CB-K14/0231,CB-K13/0845,CB-K13/0796,CB-K13/0790",""
|
|
192.168.8.85,yilan950502.tahoho.com.tw,3389,tcp,4.3,Medium,98,"Mitigation","SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection","It was possible to detect the usage of the deprecated TLSv1.0
|
|
and/or TLSv1.1 protocol on this system.","In addition to TLSv1.2+ the service is also providing the deprecated TLSv1.0 and TLSv1.1 protocols and supports one or more ciphers. Those supported ciphers can be found in the 'SSL/TLS: Report Supported Cipher Suites' (OID: 1.3.6.1.4.1.25623.1.0.802067) VT.
|
|
",1.3.6.1.4.1.25623.1.0.117274,"CVE-2011-3389,CVE-2015-0204",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,93466b06-39e2-4b96-93b8-478a1b3df512,"An attacker might be able to use the known cryptographic flaws
|
|
to eavesdrop the connection between clients and the service to get access to sensitive data
|
|
transferred within the secured connection.
|
|
|
|
Furthermore newly uncovered vulnerabilities in this protocols won't receive security updates
|
|
anymore.","It is recommended to disable the deprecated TLSv1.0 and/or
|
|
TLSv1.1 protocols in favor of the TLSv1.2+ protocols. Please see the references for more
|
|
information.","All services providing an encrypted communication using the
|
|
TLSv1.0 and/or TLSv1.1 protocols.","The TLSv1.0 and TLSv1.1 protocols contain known cryptographic
|
|
flaws like:
|
|
|
|
- CVE-2011-3389: Browser Exploit Against SSL/TLS (BEAST)
|
|
|
|
- CVE-2015-0204: Factoring Attack on RSA-EXPORT Keys Padding Oracle On Downgraded Legacy
|
|
Encryption (FREAK)","Check the used TLS protocols of the services provided by this
|
|
system.
|
|
Details:
|
|
SSL/TLS: Deprecated TLSv1.0 and TLSv1.1 Protocol Detection
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117274)
|
|
Version used: 2023-10-21T00:09:12+08:00
|
|
","","","DFN-CERT-2020-0177,DFN-CERT-2020-0111,DFN-CERT-2019-0068,DFN-CERT-2018-1441,DFN-CERT-2018-1408,DFN-CERT-2016-1372,DFN-CERT-2016-1164,DFN-CERT-2016-0388,DFN-CERT-2015-1853,DFN-CERT-2015-1332,DFN-CERT-2015-0884,DFN-CERT-2015-0800,DFN-CERT-2015-0758,DFN-CERT-2015-0567,DFN-CERT-2015-0544,DFN-CERT-2015-0530,DFN-CERT-2015-0396,DFN-CERT-2015-0375,DFN-CERT-2015-0374,DFN-CERT-2015-0305,DFN-CERT-2015-0199,DFN-CERT-2015-0079,DFN-CERT-2015-0021,DFN-CERT-2014-1414,DFN-CERT-2013-1847,DFN-CERT-2013-1792,DFN-CERT-2012-1979,DFN-CERT-2012-1829,DFN-CERT-2012-1530,DFN-CERT-2012-1380,DFN-CERT-2012-1377,DFN-CERT-2012-1292,DFN-CERT-2012-1214,DFN-CERT-2012-1213,DFN-CERT-2012-1180,DFN-CERT-2012-1156,DFN-CERT-2012-1155,DFN-CERT-2012-1039,DFN-CERT-2012-0956,DFN-CERT-2012-0908,DFN-CERT-2012-0868,DFN-CERT-2012-0867,DFN-CERT-2012-0848,DFN-CERT-2012-0838,DFN-CERT-2012-0776,DFN-CERT-2012-0722,DFN-CERT-2012-0638,DFN-CERT-2012-0627,DFN-CERT-2012-0451,DFN-CERT-2012-0418,DFN-CERT-2012-0354,DFN-CERT-2012-0234,DFN-CERT-2012-0221,DFN-CERT-2012-0177,DFN-CERT-2012-0170,DFN-CERT-2012-0146,DFN-CERT-2012-0142,DFN-CERT-2012-0126,DFN-CERT-2012-0123,DFN-CERT-2012-0095,DFN-CERT-2012-0051,DFN-CERT-2012-0047,DFN-CERT-2012-0021,DFN-CERT-2011-1953,DFN-CERT-2011-1946,DFN-CERT-2011-1844,DFN-CERT-2011-1826,DFN-CERT-2011-1774,DFN-CERT-2011-1743,DFN-CERT-2011-1738,DFN-CERT-2011-1706,DFN-CERT-2011-1628,DFN-CERT-2011-1627,DFN-CERT-2011-1619,DFN-CERT-2011-1482,WID-SEC-2023-1435,CB-K18/0799,CB-K16/1289,CB-K16/1096,CB-K15/1751,CB-K15/1266,CB-K15/0850,CB-K15/0764,CB-K15/0720,CB-K15/0548,CB-K15/0526,CB-K15/0509,CB-K15/0493,CB-K15/0384,CB-K15/0365,CB-K15/0364,CB-K15/0302,CB-K15/0192,CB-K15/0079,CB-K15/0016,CB-K14/1342,CB-K14/0231,CB-K13/0845,CB-K13/0796,CB-K13/0790",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 03 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804074,"CVE-2013-5891",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,ff29fb62-c034-4bd5-97d8-b6fc894aebcb,"Successful exploitation will allow attackers to manipulate certain data and
|
|
cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.33 and earlier on Windows,
|
|
Oracle MySQL version 5.6.13 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Partition.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 03 (Jan 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804074)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0187,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr2013) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: 5.6.11
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809815,"CVE-2013-2376,CVE-2013-1511",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9586bf95-951e-43d0-b92a-8fe855ec05bc,"Successful exploitation could allow remote attackers to affect
|
|
confidentiality, integrity, and availability via unknown vectors.","Update to version 5.5.31, 5.6.11 or later.","Oracle MySQL Server versions 5.5 through 5.5.30 and 5.6 through 5.6.10.","Unspecified error in some unknown vectors related to Stored Procedure.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.5 <= 5.5.30 / 5.6 <= 5.6.10 Security Update (cpuapr201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809815)
|
|
Version used: 2022-04-25T22:50:49+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-0882,DFN-CERT-2013-0798",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-04 (Feb 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805135,"CVE-2015-0391",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,32c40f42-94df-4475-8db5-c38e47ca1f15,"Successful exploitation will allow attackers
|
|
to disclose potentially sensitive information, manipulate certain data,
|
|
cause a DoS (Denial of Service), and compromise a vulnerable system.","Apply the patch from the referenced advisory.","Oracle MySQL Server version 5.5.38 and
|
|
earlier, and 5.6.19 and earlier on Windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to DLL.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-04 (Feb 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805135)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1264,DFN-CERT-2015-0593,DFN-CERT-2015-0427,DFN-CERT-2015-0074,CB-K15/1193,CB-K15/0567,CB-K15/0415,CB-K15/0073",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-05 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805174,"CVE-2015-2566,CVE-2015-0439,CVE-2015-0438,CVE-2015-0423,CVE-2015-0405",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0c672588-3690-4471-af1b-d7328ec28873,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.22 and earlier
|
|
on windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to DML, Server : InnoDB,
|
|
Server : Partition, Optimizer, XA.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-05 (Apr 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805174)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1623,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/0720,CB-K15/0531",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-04 (Apr 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805173,"CVE-2015-2567,CVE-2015-0511,CVE-2015-0508,CVE-2015-0507,CVE-2015-0506,CVE-2015-0503,CVE-2015-0500,CVE-2015-0498",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,fb443af6-19cc-41ea-af63-6aa7d72d9af2,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause a denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.23 and earlier
|
|
on windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to Server : Security : Privileges,
|
|
Server : SP, Server : InnoDB, Server : Memcached, InnoDB, Server : Partition,
|
|
Replication and some unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-04 (Apr 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805173)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1623,DFN-CERT-2015-0758,DFN-CERT-2015-0551,WID-SEC-2023-2068,CB-K15/1546,CB-K15/0720,CB-K15/0531",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-03 (Feb 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805134,"CVE-2015-0409,CVE-2015-0385",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a02e9d0c-8b9d-45bb-889c-247f34c0353f,"Successful exploitation will allow attackers
|
|
to disclose potentially sensitive information, manipulate certain data,
|
|
cause a DoS (Denial of Service), and compromise a vulnerable system.","Apply the patch from the referenced advisory.","Oracle MySQL Server version 5.6.21 and
|
|
earlier on Windows.","Unspecified errors in the MySQL Server
|
|
component via unknown vectors related to Optimizer and Pluggable Auth.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-03 (Feb 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805134)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-0427,DFN-CERT-2015-0074,CB-K15/0415,CB-K15/0073",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities-01 (Oct 2013) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch from the referenced advisory.
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804032,"CVE-2013-5767,CVE-2013-5786,CVE-2013-5793",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f91a3930-10e0-41a1-8a77-ba9f117a42c8,"Successful exploitation will allow remote attackers to disclose sensitive
|
|
information, manipulate certain data, cause a DoS (Denial of Service) and
|
|
bypass certain security restrictions.","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.12 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Optimizer and InnoDB.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities-01 (Oct 2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804032)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-1795,CB-K13/0789",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 05 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804076,"CVE-2014-0386,CVE-2014-0393,CVE-2014-0402",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0b37e24a-cfde-4755-8097-024d6d30f626,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.1.71 and earlier, 5.5.33 and earlier, and 5.6.13
|
|
and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Optimizer, InnoDB, and Locking.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 05 (Jan 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804076)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0180,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0187,CB-K14/0177,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 04 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804075,"CVE-2014-0401,CVE-2014-0412,CVE-2014-0437,CVE-2013-5908",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,71dd4a84-b632-4ede-96bd-12a69d2bb990,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.1.72 and earlier, 5.5.34 and earlier, and 5.6.14
|
|
and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to InnoDB, Optimizer, Error Handling, and some unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 04 (Jan 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804075)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1604,DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0180,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K15/1518,CB-K14/0710,CB-K14/0187,CB-K14/0177,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 04 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Vulnerable range: 5.6 - 5.6.16
|
|
|
|
",1.3.6.1.4.1.25623.1.0.804577,"CVE-2014-2435",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f0e03416-c9dd-442a-a6ff-f7637b4d9c0c,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.6.16 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to InnoDB.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 04 (May 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804577)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0452",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 01 (May 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804574,"CVE-2014-0384,CVE-2014-2419,CVE-2014-2438",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,2e650e46-e571-4794-8d82-a7585ff5f0fb,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.35 and earlier and 5.6.15 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Partition, Replication and XML subcomponent.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 01 (May 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804574)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0477,DFN-CERT-2014-0459,CB-K14/0710,CB-K14/0464,CB-K14/0452",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-05 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805768,"CVE-2015-4910,CVE-2015-4890,CVE-2015-4862,CVE-2015-4800,CVE-2015-4791",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c680aae1-08be-4d84-9e34-3a8570e86d3d,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality, integrity, and
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.26 and earlier
|
|
on windows","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-05 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805768)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0695,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K16/0646,CB-K16/0245,CB-K15/1844,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805766,"CVE-2015-4904,CVE-2015-4895,CVE-2015-4833,CVE-2015-4766",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,bce27723-e396-4a32-bc53-81e270ed8ae8,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality, integrity, and
|
|
availability via unknown vectors and a local attacker to affect availability
|
|
via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server Server 5.6.25 and
|
|
earlier on windows","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-03 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805766)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0845,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1692,DFN-CERT-2015-1638,CB-K16/0791,CB-K16/0246,CB-K16/0245,CB-K15/1844,CB-K15/1600,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server Component Optimizer Unspecified vulnerability (Oct 2013) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804033,"CVE-2013-3839",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f748903b-6cff-4248-bb29-9bf28fd17069,"Successful exploitation will allow remote attackers to disclose sensitive
|
|
information, manipulate certain data, cause a DoS (Denial of Service) and
|
|
bypass certain security restrictions.","Apply the patch from the referenced advisory.","Oracle MySQL versions 5.1.51 through 5.1.70, 5.5.10 through 5.5.32, and 5.6.x
|
|
through 5.6.12 on Windows.","Unspecified error in the MySQL Server component via unknown vectors related
|
|
to Optimizer.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server Component 'Optimizer' Unspecified vulnerability (Oct 201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804033)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0190,DFN-CERT-2013-2099,DFN-CERT-2013-1846,DFN-CERT-2013-1815,DFN-CERT-2013-1795,CB-K14/0187,CB-K13/1072,CB-K13/0840,CB-K13/0806,CB-K13/0789",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-05 (Jul 2015)","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805932,"CVE-2015-4756",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,dcc091ca-3ed4-4dc5-8d51-72c25267361c,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause denial of service attack.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.22 and earlier on Windows.","Unspecified error exists in the MySQL Server
|
|
component via unknown vectors related to Server : InnoDB.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Unspecified Vulnerability-05 (Jul 2015)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805932)
|
|
Version used: 2024-02-20T13:05:48+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1071,CB-K15/1020",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-04 (Oct 2015) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805767,"CVE-2015-4730",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e8cd992a-dfb8-45d5-bee7-5f4a9ac58fff,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.20 and earlier on
|
|
windows","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Unspecified Vulnerability-04 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805767)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K15/1844,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805765,"CVE-2015-4905,CVE-2015-4866",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,a4dd0274-ae04-4f59-bbfb-70c31415951a,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality, integrity, and
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.6.23 and earlier on
|
|
windows","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805765)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K16/0245,CB-K15/1844,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Jul 2015)","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805929,"CVE-2015-2648,CVE-2015-4752,CVE-2015-2643,CVE-2015-2582",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e6db673e-a99f-42c2-a485-6998af1b527b,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause denial-of-service attack.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.43 and earlier, and
|
|
5.6.24 and earlier on Windows.","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to DML, Server : I_S, Server : Optimizer,
|
|
and GIS.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-02 (Jul 2015)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805929)
|
|
Version used: 2024-02-20T13:05:48+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1096,DFN-CERT-2015-1071,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1020",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Oct 2015) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805764,"CVE-2015-4913,CVE-2015-4830,CVE-2015-4826,CVE-2015-4815,CVE-2015-4807,CVE-2015-4802,CVE-2015-4792,CVE-2015-4870,CVE-2015-4861,CVE-2015-4858,CVE-2015-4836",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,aa51f723-bbca-4616-9c98-09e07d2abc98,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect confidentiality, integrity, and
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.45 and earlier
|
|
and 5.6.26 and earlier on windows","Unspecified errors exist in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-01 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805764)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1692,DFN-CERT-2015-1638,CB-K16/1122,CB-K16/0791,CB-K16/0646,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K15/1844,CB-K15/1600,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","MySQL Unspecified vulnerability-04 (Jul 2013) - Windows","MySQL is prone to an unspecified vulnerability.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803726,"CVE-2013-3808",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d553ebcd-93d7-4f99-aa7c-5d0b3a862bb3,"Successful exploitation will allow remote authenticated users to affect
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.1.68 and earlier, 5.5.30 and earlier and 5.6.10 on Windows.","Unspecified error in the MySQL Server component via unknown vectors related
|
|
to Server Options.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
MySQL Unspecified vulnerability-04 (Jul 2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.803726)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/0620",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-02 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803724,"CVE-2013-3812,CVE-2013-3809,CVE-2013-3793",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,7ec778f2-48ef-41c2-8024-ebee1d8eeb76,"Successful exploitation will allow remote authenticated users to affect
|
|
integrity and availability via unknown vectors and cause denial of service.","Apply the patch from the referenced advisory.","Oracle MySQL 5.5.31 and earlier, 5.6.11 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Server Replication, Audit Log and Data Manipulation Language.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
MySQL Unspecified vulnerabilities-02 (Jul 2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.803724)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-2099,DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/1072,CB-K13/0620",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","MySQL Unspecified vulnerabilities-01 (Jul 2013) - Windows","MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.803723,"CVE-2013-3804,CVE-2013-3802",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,5774f521-4119-4f6d-91ba-3214b3fcdb1d,"Successful exploitation will allow remote authenticated users to affect
|
|
availability via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, 5.6.11 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Full Text Search and Server Optimizer.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
MySQL Unspecified vulnerabilities-01 (Jul 2013) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.803723)
|
|
Version used: 2024-02-20T22:37:13+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2013-2099,DFN-CERT-2013-1599,DFN-CERT-2013-1553,DFN-CERT-2013-1478,CB-K13/1072,CB-K13/0620",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.117192,"CVE-2016-0595,CVE-2016-0610",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,c24d97b2-aa1b-4a12-9eac-1e873818fc6a,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.27.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.117192)
|
|
Version used: 2021-02-12T19:09:59+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0791,CB-K16/0646,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,4.0,Medium,80,"VendorFix","Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to multiple unspecified vulnerabilities.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.806877,"CVE-2016-0596",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b58ea688-b9b1-4664-b6fe-7c5287918d21,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.46 and prior and 5.6 through 5.6.27.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.46 / 5.6 <= 5.6.27 Security Update (cpujan2016) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.806877)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-0994,DFN-CERT-2016-0845,DFN-CERT-2016-0695,DFN-CERT-2016-0532,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0143,DFN-CERT-2016-0104,CB-K16/1122,CB-K16/0936,CB-K16/0791,CB-K16/0646,CB-K16/0493,CB-K16/0246,CB-K16/0245,CB-K16/0133,CB-K16/0094",""
|
|
192.168.8.77,,3306,tcp,3.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808593,"CVE-2016-5444",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,26e6ba40-c1d6-4098-8084-ad227d674c59,"Successful exploitation will allow a remote attacker to affect
|
|
confidentiality via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.11.","An unspecified error exists in the 'MySQL Server' component via
|
|
unknown vectors related to 'Connection' sub-component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.11 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808593)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1122,CB-K16/1100",""
|
|
192.168.8.77,,3306,tcp,3.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.10 Security Update (cpujul2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.808594,"CVE-2016-3452",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,5fe475c0-b2b3-413a-823b-4d283bcd177a,"Successful exploitation will allow a remote attacker to affect
|
|
confidentiality via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.5.48 and prior, 5.6 through 5.6.29 and 5.7 through 5.7.10.","An unspecified error exists in the 'MySQL Server' component via
|
|
unknown vectors related to the 'Security Encryption' sub-component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.5.48 / 5.6 <= 5.6.29 / 5.7 <= 5.7.10 Security Updat...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.808594)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-1192,DFN-CERT-2016-1169,CB-K16/1122,CB-K16/1100",""
|
|
192.168.8.77,,3306,tcp,3.5,Low,80,"VendorFix","Oracle MySQL Multiple Unspecified Vulnerabilities-07 (Oct 2015) - Windows","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805770,"CVE-2015-4864",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0a7914b2-f8ff-48b9-a57b-44f1f22164e7,"Successful exploitation will allow an
|
|
authenticated remote attacker to affect integrity via unknown vectors.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.43 and earlier,
|
|
and 5.6.24 and earlier on windows","Unspecified error exists in the MySQL Server
|
|
component via unknown vectors related to Server.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified Vulnerabilities-07 (Oct 2015) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805770)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0265,DFN-CERT-2015-1946,DFN-CERT-2015-1638,CB-K16/0245,CB-K15/1844,CB-K15/1554",""
|
|
192.168.8.77,,3306,tcp,3.5,Low,80,"VendorFix","Oracle MySQL Unspecified Vulnerability-04 (Jul 2015)","Oracle MySQL is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: Apply the patch
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.805931,"CVE-2015-4757",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6bb81d42-53f7-44fd-9a6c-89b4258aada1,"Successful exploitation will allow an
|
|
authenticated remote attacker to cause denial of service attack.","Apply the patch from the referenced advisory.","Oracle MySQL Server 5.5.42 and earlier,
|
|
and 5.6.23 and earlier on Windows.","Unspecified error exists in the MySQL Server
|
|
component via unknown vectors related to Server : Optimizer.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Unspecified Vulnerability-04 (Jul 2015)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.805931)
|
|
Version used: 2024-02-20T13:05:48+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2015-1272,DFN-CERT-2015-1264,DFN-CERT-2015-1096,DFN-CERT-2015-1071,CB-K15/1202,CB-K15/1193,CB-K15/1045,CB-K15/1020",""
|
|
192.168.8.77,,3306,tcp,3.1,Low,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpuoct2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.809388,"CVE-2016-8288",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,d24e3870-c51a-4ba6-9b54-368c2f81750f,"Successful exploitation of this vulnerability will allow a remote
|
|
authenticated user to partially modify data.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.30 and 5.7 through 5.7.12.","The flaw exists due to an unspecified vulnerability within the
|
|
'Server: InnoDB' component.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.30 / 5.7 <= 5.7.12 Security Update (cpuoct201...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.809388)
|
|
Version used: 2021-10-13T19:01:26+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-2089,DFN-CERT-2016-1859,DFN-CERT-2016-1714,CB-K16/1979,CB-K16/1755,CB-K16/1624",""
|
|
192.168.8.77,,3306,tcp,2.8,Low,80,"VendorFix","Oracle MySQL Multiple Unspecified vulnerabilities - 06 (Jan 2014) - Windows","Oracle MySQL is prone to multiple unspecified vulnerabilities.","Vulnerability was detected according to the Vulnerability Detection Method.",1.3.6.1.4.1.25623.1.0.804077,"CVE-2014-0420",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,90c95b10-3289-4b35-98f6-7925c2b5fa04,"Successful exploitation will allow attackers to manipulate certain data
|
|
and cause a DoS (Denial of Service).","Apply the patch from the referenced advisory.","Oracle MySQL version 5.5.34 and earlier, and 5.6.14 and earlier on Windows.","Unspecified errors in the MySQL Server component via unknown vectors related
|
|
to Replication.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Multiple Unspecified vulnerabilities - 06 (Jan 2014) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.804077)
|
|
Version used: 2024-02-09T13:06:25+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2014-0742,DFN-CERT-2014-0190,DFN-CERT-2014-0085,DFN-CERT-2014-0074,DFN-CERT-2014-0048,CB-K14/0710,CB-K14/0187,CB-K14/0082,CB-K14/0074,CB-K14/0055",""
|
|
192.168.8.77,,3306,tcp,2.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.18 Security Update (cpujul2019) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.6.45
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.142643,"CVE-2019-2730",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,03cdf567-3bce-4d07-b06f-8ffa1b1daaef,"","Update to version 5.6.45, 5.7.19 or later.","Oracle MySQL Server versions 5.6.44 and prior and 5.7 through 5.7.18.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.6.44 / 5.7 <= 5.7.18 Security Update (cpujul2019) -...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.142643)
|
|
Version used: 2021-09-07T22:01:38+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2019-2169,DFN-CERT-2019-1453,CB-K19/0620",""
|
|
192.168.8.77,,3306,tcp,2.7,Low,80,"VendorFix","Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpuapr2023) - Windows","Oracle MySQL Server is prone to a denial of service (DoS)
|
|
vulnerability.","Installed version: 5.6.10
|
|
Fixed version: 5.7.41
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.149532,"CVE-2023-21963",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,6c167597-b869-4816-80c6-8f10a92b93f5,"","Update to version 5.7.41, 8.0.32 or later.","Oracle MySQL Server version 5.7.40 and prior and 8.x through
|
|
8.0.31.","","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server <= 5.7.40, 8.x <= 8.0.31 Security Update (cpuapr2023) - ...
|
|
(OID: 1.3.6.1.4.1.25623.1.0.149532)
|
|
Version used: 2023-10-13T13:06:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2023-0885,WID-SEC-2023-1033",""
|
|
192.168.8.73,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776100354
|
|
Packet 2: 776100468
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,98995537-312f-4cb9-868e-8a3acbf9eff2,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.74,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776100550
|
|
Packet 2: 776100660
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,4dd06049-3613-4300-baba-5412a79bbacd,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.232,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776037987
|
|
Packet 2: 776038100
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,739c92ed-11e2-43c3-8726-025c05a84aa4,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.72,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776038273
|
|
Packet 2: 776038388
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,1794b668-7d42-47f5-b4d6-052cb059ab0a,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.85,yilan950502.tahoho.com.tw,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 580440354
|
|
Packet 2: 580441503
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,272fb516-5abc-4c17-819c-514e68a627e6,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.61,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776066889
|
|
Packet 2: 776067002
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,9d370575-eca2-4761-ad4d-b6d05076c99d,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.157,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776066986
|
|
Packet 2: 776067100
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,77f27061-9c10-4820-a486-450c5c45d198,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.81,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776068577
|
|
Packet 2: 776068689
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,de48b858-9ebb-4db6-bc94-f737fd2e5986,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.111,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 3466672361
|
|
Packet 2: 3466673515
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,bd8d4a9d-e591-464e-9105-2448dcfad365,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.75,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776096810
|
|
Packet 2: 776096924
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f332cb75-ff52-4975-b03d-08d52e228aa8,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.62,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776102987
|
|
Packet 2: 776103103
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,173b63a4-a762-4607-a72d-053c62b4d781,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.230,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776118898
|
|
Packet 2: 776119012
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,78a308b8-acca-4428-a9f9-6680d19ecb78,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.70,,,,2.6,Low,80,"Mitigation","TCP Timestamps Information Disclosure","The remote host implements TCP timestamps and therefore allows
|
|
to compute the uptime.","It was detected that the host implements RFC1323/RFC7323.
|
|
|
|
The following timestamps were retrieved with a delay of 1 seconds in-between:
|
|
Packet 1: 776159214
|
|
Packet 2: 776159328
|
|
",1.3.6.1.4.1.25623.1.0.80091,"",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,948c5fb2-356f-4b98-bab2-66bf599305a8,"A side effect of this feature is that the uptime of the remote
|
|
host can sometimes be computed.","To disable TCP timestamps on linux add the line
|
|
'net.ipv4.tcp_timestamps = 0' to /etc/sysctl.conf. Execute 'sysctl -p' to apply the settings at
|
|
runtime.
|
|
|
|
To disable TCP timestamps on Windows execute 'netsh int tcp set global timestamps=disabled'
|
|
|
|
Starting with Windows Server 2008 and Vista, the timestamp can not be completely disabled.
|
|
|
|
The default behavior of the TCP/IP stack on this Systems is to not use the Timestamp options when
|
|
initiating TCP connections, but use them if the TCP peer that is initiating communication includes
|
|
them in their synchronize (SYN) segment.
|
|
|
|
See the references for more information.","TCP implementations that implement RFC1323/RFC7323.","The remote host implements TCP timestamps, as defined by
|
|
RFC1323/RFC7323.","Special IP packets are forged and sent with a little delay in
|
|
between to the target IP. The responses are searched for a timestamps. If found, the timestamps
|
|
are reported.
|
|
Details:
|
|
TCP Timestamps Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.80091)
|
|
Version used: 2023-12-16T00:10:08+08:00
|
|
","","","",""
|
|
192.168.8.74,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,53864daf-1811-4d36-a017-ebd14c50fb63,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.72,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ce4300a-6b11-4c3d-a2a8-2039f647c988,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.77,,3306,tcp,2.1,Low,80,"VendorFix","Oracle MySQL Server 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows","Oracle MySQL Server is prone to an unspecified vulnerability.","Installed version: 5.6.10
|
|
Fixed version: See the referenced vendor advisory
|
|
Installation
|
|
path / port: 3306/tcp
|
|
|
|
",1.3.6.1.4.1.25623.1.0.806875,"CVE-2016-0605",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e5b3240a-44f1-41e4-bcde-1f6db858ced3,"Successful exploitation will allow an authenticated remote attacker
|
|
to affect confidentiality, integrity, and availability via unknown vectors.","Updates are available. Please see the references for more information.","Oracle MySQL Server versions 5.6 through 5.6.26.","Unspecified errors exist in the 'MySQL Server' component via
|
|
unknown vectors.","Checks if a vulnerable version is present on the target host.
|
|
Details:
|
|
Oracle MySQL Server 5.6 <= 5.6.26 Security Update (cpujan2016) - Windows
|
|
(OID: 1.3.6.1.4.1.25623.1.0.806875)
|
|
Version used: 2022-04-13T21:17:10+08:00
|
|
","Product: cpe:/a:mysql:mysql:5.6.10
|
|
Method: MariaDB / Oracle MySQL Detection (MySQL Protocol)
|
|
(OID: 1.3.6.1.4.1.25623.1.0.100152)
|
|
","","DFN-CERT-2016-0695,DFN-CERT-2016-0266,DFN-CERT-2016-0265,DFN-CERT-2016-0104,CB-K16/0646,CB-K16/0246,CB-K16/0245,CB-K16/0094",""
|
|
192.168.8.75,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,53693730-ff23-4e7b-936c-f19180aabe7c,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.157,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,91632323-c5ef-4826-bc16-1a16928a666e,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.232,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,90979c61-45d9-4630-af96-f217001484b5,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.70,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,b37af213-e512-40d3-94a3-1d0047ce61ff,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.61,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,e91537e7-0a62-4e4b-a0ba-cd6a50f64108,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.111,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,aa2837fb-580e-40a2-b191-1e1b7dd7f154,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.77,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,0ba39a39-869c-4e9e-9a1b-689103bf7aed,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|
|
192.168.8.73,,,,2.1,Low,80,"Mitigation","ICMP Timestamp Reply Information Disclosure","The remote host responded to an ICMP timestamp request.","The following response / ICMP packet has been received:
|
|
- ICMP Type: 14
|
|
- ICMP Code: 0
|
|
",1.3.6.1.4.1.25623.1.0.103190,"CVE-1999-0524",7cc28098-bd93-4d11-9167-6caf249135d7,"8.0-2-5",2024-06-14T12:02:24+08:00,f6f479e8-514c-47f8-a595-d838cb2efc52,"This information could theoretically be used to exploit weak
|
|
time-based random number generators in other services.","Various mitigations are possible:
|
|
|
|
- Disable the support for ICMP timestamp on the remote host completely
|
|
|
|
- Protect the remote host by a firewall, and block ICMP packets passing through the firewall in
|
|
either direction (either completely or only for untrusted networks)","","The Timestamp Reply is an ICMP message which replies to a
|
|
Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as
|
|
well as a receive timestamp and a transmit timestamp.","Sends an ICMP Timestamp (Type 13) request and checks if a
|
|
Timestamp Reply (Type 14) is received.
|
|
Details:
|
|
ICMP Timestamp Reply Information Disclosure
|
|
(OID: 1.3.6.1.4.1.25623.1.0.103190)
|
|
Version used: 2023-05-11T17:09:33+08:00
|
|
","","","DFN-CERT-2014-0658,CB-K15/1514,CB-K14/0632",""
|