Language:
https://bugzilla.novell.com/show_bug.cgi?id=857678
https://bugzilla.novell.com/show_bug.cgi?id=868673
https://bugzilla.novell.com/show_bug.cgi?id=878779
https://bugzilla.novell.com/show_bug.cgi?id=901237
https://bugzilla.novell.com/show_bug.cgi?id=914058
http://support.novell.com/security/cve/CVE-2012-5615.html
http://support.novell.com/security/cve/CVE-2014-0224.html
http://support.novell.com/security/cve/CVE-2014-4274.html
http://support.novell.com/security/cve/CVE-2014-4287.html
http://support.novell.com/security/cve/CVE-2014-6463.html
http://support.novell.com/security/cve/CVE-2014-6464.html
http://support.novell.com/security/cve/CVE-2014-6469.html
http://support.novell.com/security/cve/CVE-2014-6474.html
http://support.novell.com/security/cve/CVE-2014-6478.html
http://support.novell.com/security/cve/CVE-2014-6484.html
http://support.novell.com/security/cve/CVE-2014-6489.html
http://support.novell.com/security/cve/CVE-2014-6491.html
http://support.novell.com/security/cve/CVE-2014-6494.html
http://support.novell.com/security/cve/CVE-2014-6495.html
http://support.novell.com/security/cve/CVE-2014-6496.html
http://support.novell.com/security/cve/CVE-2014-6500.html
http://support.novell.com/security/cve/CVE-2014-6505.html
http://support.novell.com/security/cve/CVE-2014-6507.html
http://support.novell.com/security/cve/CVE-2014-6520.html
http://support.novell.com/security/cve/CVE-2014-6530.html
http://support.novell.com/security/cve/CVE-2014-6551.html
http://support.novell.com/security/cve/CVE-2014-6555.html
http://support.novell.com/security/cve/CVE-2014-6559.html
http://support.novell.com/security/cve/CVE-2014-6564.html
http://support.novell.com/security/cve/CVE-2014-6568.html
http://support.novell.com/security/cve/CVE-2015-0374.html
http://support.novell.com/security/cve/CVE-2015-0381.html
http://support.novell.com/security/cve/CVE-2015-0382.html
http://support.novell.com/security/cve/CVE-2015-0385.html
http://support.novell.com/security/cve/CVE-2015-0391.html
http://support.novell.com/security/cve/CVE-2015-0409.html
Severity: High
ID: 82428
File Name: suse_11_libmysql55client18-150302.nasl
Version: 1.5
Type: local
Agent: unix
Family: SuSE Local Security Checks
Published: 3/30/2015
Updated: 1/6/2021
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Factor: High
Score: 7.7
Risk Factor: High
Base Score: 8
Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:C
CPE: p-cpe:/a:novell:suse_linux:11:libmysql55client18, p-cpe:/a:novell:suse_linux:11:libmysql55client18-32bit, p-cpe:/a:novell:suse_linux:11:libmysql55client_r18, p-cpe:/a:novell:suse_linux:11:libmysql55client_r18-32bit, p-cpe:/a:novell:suse_linux:11:libmysqlclient15, p-cpe:/a:novell:suse_linux:11:libmysqlclient15-32bit, p-cpe:/a:novell:suse_linux:11:libmysqlclient_r15, p-cpe:/a:novell:suse_linux:11:libmysqlclient_r15-32bit, p-cpe:/a:novell:suse_linux:11:mysql, p-cpe:/a:novell:suse_linux:11:mysql-client, p-cpe:/a:novell:suse_linux:11:mysql-tools, cpe:/o:novell:suse_linux:11
Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/2/2015
Core Impact
CVE: CVE-2012-5615, CVE-2014-0224, CVE-2014-4274, CVE-2014-4287, CVE-2014-6463, CVE-2014-6464, CVE-2014-6469, CVE-2014-6474, CVE-2014-6478, CVE-2014-6484, CVE-2014-6489, CVE-2014-6491, CVE-2014-6494, CVE-2014-6495, CVE-2014-6496, CVE-2014-6500, CVE-2014-6505, CVE-2014-6507, CVE-2014-6520, CVE-2014-6530, CVE-2014-6551, CVE-2014-6555, CVE-2014-6559, CVE-2014-6564, CVE-2014-6568, CVE-2015-0374, CVE-2015-0381, CVE-2015-0382, CVE-2015-0385, CVE-2015-0391, CVE-2015-0409, CVE-2015-0411, CVE-2015-0432