Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. ![]() Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Replication). We recommend upgrading to version 3.15.0 or greater. Since the symbol is incorrectly parsed, the file is nullptr. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Nullptr dereference when a null char is present in a proto symbol. CVSS 3.1 Base Score 4.9 (Availability impacts). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. ![]() ![]() Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). CVSS 3.1 Base Score 4.4 (Availability impacts). Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DDL).
0 Comments
Leave a Reply. |