Search for packages
purl | pkg:maven/mysql/mysql-connector-java@5.1.45 |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-3819-zspc-aaaq
Aliases: CVE-2020-2934 |
Channel Accessible by Non-Endpoint Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DoS) of MySQL Connectors. |
Affected by 4 other vulnerabilities. Affected by 3 other vulnerabilities. |
VCID-42vb-pefk-aaas
Aliases: CVE-2020-2933 |
Uncontrolled Resource Consumption Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DoS) of MySQL Connectors. |
Affected by 4 other vulnerabilities. |
VCID-45qx-es17-aaan
Aliases: CVE-2022-21363 GHSA-g76j-4cxx-23h9 |
Unknown Vulnerability Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 1 other vulnerability. |
VCID-abud-7174-aaah
Aliases: CVE-2019-2692 GHSA-jcq3-cprp-m333 |
Privilege escalation in mysql-connector-jav |
Affected by 4 other vulnerabilities. |
VCID-kjff-wt5w-aaac
Aliases: CVE-2023-22102 GHSA-m6vm-37g8-gqvh |
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.1.0 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). | There are no reported fixed by versions. |
VCID-kz2t-1jdd-aaaf
Aliases: CVE-2018-3258 GHSA-4vrv-ch96-6h42 |
Improper Access Control A vulnerability in the MySQL Connectors component of Oracle MySQL exists. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. |
Affected by 6 other vulnerabilities. |
VCID-z2s6-pcsm-aaag
Aliases: CVE-2020-2875 |
Channel Accessible by Non-Endpoint Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. |
Affected by 4 other vulnerabilities. Affected by 5 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |