Search for packages
purl | pkg:maven/mysql/mysql-connector-java@5.1.34 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-3819-zspc-aaaq
Aliases: CVE-2020-2934 |
Channel Accessible by Non-Endpoint Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DoS) of MySQL Connectors. |
Affected by 4 other vulnerabilities. Affected by 3 other vulnerabilities. |
VCID-42vb-pefk-aaas
Aliases: CVE-2020-2933 |
Uncontrolled Resource Consumption Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DoS) of MySQL Connectors. |
Affected by 4 other vulnerabilities. |
VCID-45qx-es17-aaan
Aliases: CVE-2022-21363 GHSA-g76j-4cxx-23h9 |
Unknown Vulnerability Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 1 other vulnerability. |
VCID-77g2-evrk-aaar
Aliases: CVE-2017-3589 GHSA-cjcf-wm2p-59h5 |
Incorrect Privilege Assignment Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Connectors executes to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL. |
Affected by 7 other vulnerabilities. |
VCID-abud-7174-aaah
Aliases: CVE-2019-2692 GHSA-jcq3-cprp-m333 |
Privilege escalation in mysql-connector-jav |
Affected by 4 other vulnerabilities. |
VCID-gat7-vry8-aaak
Aliases: CVE-2017-3523 GHSA-2xxh-f8r3-hvvr |
Incorrect Privilege Assignment Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 9 other vulnerabilities. |
VCID-kjff-wt5w-aaac
Aliases: CVE-2023-22102 GHSA-m6vm-37g8-gqvh |
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). | There are no reported fixed by versions. |
VCID-kz2t-1jdd-aaaf
Aliases: CVE-2018-3258 GHSA-4vrv-ch96-6h42 |
Improper Access Control A vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 6 other vulnerabilities. |
VCID-r8jd-yxpb-aaaa
Aliases: CVE-2017-3586 GHSA-pwh7-92h3-mqr6 |
Privilege An easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. |
Affected by 7 other vulnerabilities. |
VCID-z2s6-pcsm-aaag
Aliases: CVE-2020-2875 |
Channel Accessible by Non-Endpoint Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. |
Affected by 4 other vulnerabilities. Affected by 5 other vulnerabilities. |
VCID-zwr9-apn3-aaan
Aliases: CVE-2015-2575 GHSA-gc43-g62c-99g2 |
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J. |
Affected by 10 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |