Логотип exploitDog
product: "mysql_server"
Консоль
Логотип exploitDog

exploitDog

product: "mysql_server"
MySQL

MySQLсвободная реляционная система управления базами данных

Релизный цикл, информация об уязвимостях

Продукт: MySQL
Вендор: oracle

График релизов

8.08.18.28.38.49.09.19.29.32018201920202021202220232024202520262027202820292030203120322033

Недавние уязвимости MySQL

Количество 1 152

redhat логотип

CVE-2021-2399

почти 4 года назад

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVSS3: 4.9
EPSS: Низкий
redhat логотип

CVE-2021-36222

почти 4 года назад

ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2021:1762-1

почти 4 года назад

Security update for curl

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2021:14760-1

почти 4 года назад

Security update for curl

EPSS: Низкий
nvd логотип

CVE-2021-22901

около 4 лет назад

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the corre

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2021-22901

около 4 лет назад

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability ...

CVSS3: 8.1
EPSS: Низкий
nvd логотип

CVE-2021-22898

около 4 лет назад

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVSS3: 3.1
EPSS: Низкий
debian логотип

CVE-2021-22898

около 4 лет назад

curl 7.7 through 7.76.1 suffers from an information disclosure when th ...

CVSS3: 3.1
EPSS: Низкий
nvd логотип

CVE-2021-22897

около 4 лет назад

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2021-22897

около 4 лет назад

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wr ...

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
1
redhat логотип
CVE-2021-2399

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).

CVSS3: 4.9
0%
Низкий
почти 4 года назад
redhat логотип
CVE-2021-36222

ec_verify in kdc/kdc_preauth_ec.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.4 and 1.19.x before 1.19.2 allows remote attackers to cause a NULL pointer dereference and daemon crash. This occurs because a return value is not properly managed in a certain situation.

CVSS3: 7.5
5%
Низкий
почти 4 года назад
suse-cvrf логотип
openSUSE-SU-2021:1762-1

Security update for curl

0%
Низкий
почти 4 года назад
suse-cvrf логотип
SUSE-SU-2021:14760-1

Security update for curl

0%
Низкий
почти 4 года назад
nvd логотип
CVE-2021-22901

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the corre

CVSS3: 8.1
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-22901

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability ...

CVSS3: 8.1
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-22898

curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.

CVSS3: 3.1
0%
Низкий
около 4 лет назад
debian логотип
CVE-2021-22898

curl 7.7 through 7.76.1 suffers from an information disclosure when th ...

CVSS3: 3.1
0%
Низкий
около 4 лет назад
nvd логотип
CVE-2021-22897

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.

CVSS3: 5.3
1%
Низкий
около 4 лет назад
debian логотип
CVE-2021-22897

curl 7.61.0 through 7.76.1 suffers from exposure of data element to wr ...

CVSS3: 5.3
1%
Низкий
около 4 лет назад

Уязвимостей на страницу


Поделиться