U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-10283

Change History

Initial Analysis by NIST 10/24/2017 12:49:35 PM

Action Type Old Value New Value
Added CVSS V3

								
							
							
						
AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CVSS V2

								
							
							
						
(AV:N/AC:M/Au:S/C:N/I:N/A:P)
Added CWE

								
							
							
						
NVD-CWE-noinfo
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:oracle:mysql:5.6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.5:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.6:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.7:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.8:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.9:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.10:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.11:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.12:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.13:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.14:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.15:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.16:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.17:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.21:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.22:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.23:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.26:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.27:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.28:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.29:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.30:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.31:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.32:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.33:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.34:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.35:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.36:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.6.37:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.1:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.2:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.3:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.4:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.5:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.6:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.7:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.8:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.9:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.10:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.11:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.12:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.13:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.14:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.15:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.16:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.17:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.18:*:*:*:*:*:*:*
     *cpe:2.3:a:oracle:mysql:5.7.19:*:*:*:*:*:*:*
Changed Reference Type
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html No Types Assigned
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html Patch, Vendor Advisory
Changed Reference Type
http://www.securityfocus.com/bid/101420 No Types Assigned
http://www.securityfocus.com/bid/101420 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securitytracker.com/id/1039597 No Types Assigned
http://www.securitytracker.com/id/1039597 Third Party Advisory, VDB Entry