

User to inject SQL code that runs with high privileges on a remote MySQL Serverĭatabase. MySQL Stored SQL Injection (CVE-2013-0375) VulnerabilityĪ vulnerability in the MySQL Server database could allow a remote, authenticated Important Note: The scoring models assume target systems are employing the Information from additional sources was also used when more details were

National Vulnerability Database (NVD) at. Metric values differ from their CVSS version 3.0 counterparts are alsoĭetails of the vulnerabilities and attacks were sourced primarily from the Scoring differences between the two standards. CVSS version 2.0 scores are provided to show A summary of each vulnerability is provided, along This document demonstrates how to apply the CVSS version 3.1 standard to score Reference implementation of the CVSS v3.1 equations available at. Includes examples of CVSS v3.1 scoring in practice. Includes further discussion of CVSS v3.1, a scoring rubric, and a glossary. Includes metric descriptions, formulas, and vector string. Resources & Linksīelow are useful references to additional CVSS v3.1 documents. If you wish to use a specific version of the Examples document, use:Ĭommon Vulnerability Scoring System v3.1: ExamplesĪlso available in PDF format (533KiB). It is currently CVSS version 3.1, released in June 2019. This page updates with each release of the CVSS standard. Linux Red Hat Enterprise 5.2, 6.2, 6.3, 6.4Ħ.10.0 - Source RPM 6.10.Common Vulnerability Scoring System version 3.1: Specification Document CVSS Version 3.1 Release User Guide | Release Notes | Sample SSL Key/Certificate (RSA) Modelīased traffic over Ethernet to remote IOLAN(s) Operating System Use this chart to cross reference the model name to the product name. This firmware should be used with the following products. If you have a non-FIPS application please use the firmware above. Perle does not recommend this firmware for non-FIPS applications. *ONLY USE for FIPS compliancy applications in the USA and Canada.
