Search for vulnerabilities
Vulnerability details: VCID-ahmd-81af-aaaf
Vulnerability ID VCID-ahmd-81af-aaaf
Aliases CVE-2015-0432
Summary CVE-2015-0432 mysql: unspecified vulnerability related to Server:InnoDB:DDL:Foreign Key (CPU Jan 2015)
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
generic_textual Medium http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0432.html
rhas Moderate https://access.redhat.com/errata/RHSA-2015:0116
rhas Moderate https://access.redhat.com/errata/RHSA-2015:0117
rhas Moderate https://access.redhat.com/errata/RHSA-2015:0118
rhas Moderate https://access.redhat.com/errata/RHSA-2015:1628
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00214 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00237 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.00397 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.01296 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.01296 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.01296 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.01296 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
epss 0.01633 https://api.first.org/data/v1/epss?cve=CVE-2015-0432
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411
generic_textual Medium https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432
cvssv2 4.0 https://nvd.nist.gov/vuln/detail/CVE-2015-0432
generic_textual Medium https://ubuntu.com/security/notices/USN-2480-1
cvssv3.1 8.8 http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
cvssv3.1 7.5 http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
generic_textual MODERATE http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
cvssv3.1 5.3 http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
generic_textual HIGH http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Reference id Reference type URL
http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149929.html
http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00016.html
http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-0432.html
http://rhn.redhat.com/errata/RHSA-2015-0116.html
http://rhn.redhat.com/errata/RHSA-2015-0117.html
http://rhn.redhat.com/errata/RHSA-2015-0118.html
http://rhn.redhat.com/errata/RHSA-2015-1628.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0432.json
https://api.first.org/data/v1/epss?cve=CVE-2015-0432
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432
http://secunia.com/advisories/62728
http://secunia.com/advisories/62730
http://secunia.com/advisories/62732
https://exchange.xforce.ibmcloud.com/vulnerabilities/100187
https://security.gentoo.org/glsa/201504-05
https://ubuntu.com/security/notices/USN-2480-1
http://www.debian.org/security/2015/dsa-3135
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://www.securityfocus.com/bid/72217
http://www.securitytracker.com/id/1031581
http://www.ubuntu.com/usn/USN-2480-1
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*
cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_workstation_extension:12:-:*:*:*:*:*:*
CVE-2015-0432 https://nvd.nist.gov/vuln/detail/CVE-2015-0432
RHBA-2015:0820 https://bugzilla.redhat.com/show_bug.cgi?id=1184561
RHSA-2015:0116 https://access.redhat.com/errata/RHSA-2015:0116
RHSA-2015:0117 https://access.redhat.com/errata/RHSA-2015:0117
RHSA-2015:0118 https://access.redhat.com/errata/RHSA-2015:0118
RHSA-2015:1628 https://access.redhat.com/errata/RHSA-2015:1628
USN-2480-1 https://usn.ubuntu.com/2480-1/
No exploits are available.
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2015-0432
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.59811
EPSS Score 0.00214
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.