Search for packages
| purl | pkg:maven/mysql/mysql-connector-java@8.0.11 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-28f6-ud4w-aug9
Aliases: CVE-2020-2934 |
Multiple vulnerabilities have been found in MySQL, the worst of which could result in the arbitrary execution of code. |
Affected by 3 other vulnerabilities. |
|
VCID-4w4j-hadb-w3e6
Aliases: CVE-2021-2471 GHSA-w6f2-8wx4-47r5 |
Uncontrolled Resource Consumption Vulnerability in the MySQL Connectors product of Oracle MySQL. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Connectors accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DoS) of MySQL Connectors. |
Affected by 2 other vulnerabilities. |
|
VCID-7v7q-8wa6-hff5
Aliases: CVE-2018-3258 GHSA-4vrv-ch96-6h42 |
Improper Access Control A vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 6 other vulnerabilities. |
|
VCID-e37q-8shh-v7aw
Aliases: CVE-2022-21363 GHSA-g76j-4cxx-23h9 |
Unknown Vulnerability Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 1 other vulnerability. |
|
VCID-ht8v-kvcr-77ds
Aliases: CVE-2019-2692 GHSA-jcq3-cprp-m333 |
Improper Input Validation Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and can result in takeover of MySQL Connectors. |
Affected by 4 other vulnerabilities. |
|
VCID-u33b-3n5s-4qfv
Aliases: CVE-2020-2875 |
Multiple vulnerabilities have been found in MySQL, the worst of which could result in the arbitrary execution of code. |
Affected by 5 other vulnerabilities. |
|
VCID-xap5-du1j-c7ed
Aliases: CVE-2023-22102 GHSA-m6vm-37g8-gqvh |
Improper Access Control Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||