Search for packages
| purl | pkg:maven/mysql/mysql-connector-java@6.0.4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-7v7q-8wa6-hff5
Aliases: CVE-2018-3258 GHSA-4vrv-ch96-6h42 |
Improper Access Control A vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 6 other vulnerabilities. |
|
VCID-e37q-8shh-v7aw
Aliases: CVE-2022-21363 GHSA-g76j-4cxx-23h9 |
Unknown Vulnerability Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 1 other vulnerability. |
|
VCID-ht8v-kvcr-77ds
Aliases: CVE-2019-2692 GHSA-jcq3-cprp-m333 |
Improper Input Validation Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and can result in takeover of MySQL Connectors. |
Affected by 4 other vulnerabilities. |
|
VCID-xap5-du1j-c7ed
Aliases: CVE-2023-22102 GHSA-m6vm-37g8-gqvh |
Improper Access Control Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||