Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-21231 (GCVE-0-2024-21231)
Vulnerability from cvelistv5 – Published: 2024-10-15 19:52 – Updated: 2025-11-03 21:53- Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Oracle Corporation | MySQL Server |
Affected:
* , ≤ 8.0.39
(custom)
Affected: * , ≤ 8.4.2 (custom) Affected: * , ≤ 9.0.1 (custom) cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21231",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-17T13:42:42.853283Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T13:33:32.263Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:53:10.198Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
],
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "8.0.39",
"status": "affected",
"version": "*",
"versionType": "custom"
},
{
"lessThanOrEqual": "8.4.2",
"status": "affected",
"version": "*",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.0.1",
"status": "affected",
"version": "*",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T19:52:45.633Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2024-21231",
"datePublished": "2024-10-15T19:52:45.633Z",
"dateReserved": "2023-12-07T22:28:10.694Z",
"dateUpdated": "2025-11-03T21:53:10.198Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20241025-0006/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T21:53:10.198Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21231\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-17T13:42:42.853283Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-17T13:42:46.519Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 3.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*\", \"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*\", \"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*\"], \"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.0.39\"}, {\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.4.2\"}, {\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.0.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2024-10-15T19:52:45.633Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21231\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T21:53:10.198Z\", \"dateReserved\": \"2023-12-07T22:28:10.694Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2024-10-15T19:52:45.633Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CNVD-2025-18082
Vulnerability from cnvd - Published: 2025-08-11厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpuoct2024.html
| Name | ['Oracle MySQL Server <=8.0.39', 'Oracle MySQL Server <=9.0.1', 'Oracle MySQL Server <= 8.4.2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-21231",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
}
},
"description": "OOracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\n\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpuoct2024.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-18082",
"openTime": "2025-08-11",
"patchDescription": "OOracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\r\n\r\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-18082\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Server \u003c=8.0.39",
"Oracle MySQL Server \u003c=9.0.1",
"Oracle MySQL Server \u003c= 8.4.2"
]
},
"referenceLink": "https://access.redhat.com/security/cve/cve-2024-21231",
"serverity": "\u4f4e",
"submitTime": "2024-10-23",
"title": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-18082\uff09"
}
CERTFR-2024-AVI-0884
Vulnerability from certfr_avis - Published: 2024-10-16 - Updated: 2024-10-16
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 9.0.0 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.38 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 9.0.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.38 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21262"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21204"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"initial_release_date": "2024-10-16T00:00:00",
"last_revision_date": "2024-10-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0884",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2024",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CVE-2024-21231
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
- krb5: GSS message token handling (CVE-2024-37371)
- curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
- mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
- mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
- mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
- mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
- mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
- mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
- mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
- mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
- mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
- mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
- mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
- curl: curl netrc password leak (CVE-2024-11053)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
- mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
- mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
- mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
- mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
- mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
- mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
- mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
- mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
- mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
- mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.6.0+3340+d764b636"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.996-2.module_el8.6.0+3340+d764b636"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-17.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mecab-ipadic-EUCJP"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.7.0.20070801-17.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-1.module_el8.10.0+3965+b415b607"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n * krb5: GSS message token handling (CVE-2024-37371)\n * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n * curl: curl netrc password leak (CVE-2024-11053)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:1673",
"modified": "2025-02-20T11:16:10Z",
"published": "2025-02-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318857"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318858"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318870"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318873"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318874"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318876"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318882"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318884"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318886"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318897"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318914"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318923"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318926"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318927"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331191"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339218"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339221"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339226"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339231"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339236"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339238"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339243"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339252"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339259"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339266"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339275"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339277"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339281"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339293"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339299"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339300"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339305"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-1673.html"
}
],
"related": [
"CVE-2024-5535",
"CVE-2024-37371",
"CVE-2024-7264",
"CVE-2024-21238",
"CVE-2024-21196",
"CVE-2024-21241",
"CVE-2024-21231",
"CVE-2024-21197",
"CVE-2024-21218",
"CVE-2024-21201",
"CVE-2024-21236",
"CVE-2024-21237",
"CVE-2024-21203",
"CVE-2024-21212",
"CVE-2024-21219",
"CVE-2024-21230",
"CVE-2024-21213",
"CVE-2024-21194",
"CVE-2024-21199",
"CVE-2024-21193",
"CVE-2024-21198",
"CVE-2024-21247",
"CVE-2024-21239",
"CVE-2024-11053",
"CVE-2025-21497",
"CVE-2025-21520",
"CVE-2025-21490",
"CVE-2025-21529",
"CVE-2025-21531",
"CVE-2025-21504",
"CVE-2025-21540",
"CVE-2025-21555",
"CVE-2025-21543",
"CVE-2025-21491",
"CVE-2025-21525",
"CVE-2025-21536",
"CVE-2025-21521",
"CVE-2025-21501",
"CVE-2025-21534",
"CVE-2025-21494",
"CVE-2025-21519",
"CVE-2025-21522",
"CVE-2025-21503",
"CVE-2025-21518",
"CVE-2025-21559",
"CVE-2025-21546",
"CVE-2025-21500",
"CVE-2025-21523",
"CVE-2025-21505"
],
"summary": "Important: mysql:8.0 security update"
}
CVE-2024-21231
Vulnerability from osv_almalinux
MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries.
Security Fix(es):
- openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)
- krb5: GSS message token handling (CVE-2024-37371)
- curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)
- mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)
- mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)
- mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)
- mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)
- mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)
- mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)
- mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)
- mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)
- mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)
- mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)
- mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)
- mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)
- mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)
- curl: curl netrc password leak (CVE-2024-11053)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)
- mysql: MySQL Server Options Vulnerability (CVE-2025-21520)
- mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)
- mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)
- mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)
- mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)
- mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)
- mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)
- mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)
- mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)
- mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)
- mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)
- mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)
- mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)
- mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-errmsg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-server"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "mysql-test"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.41-2.el9_5"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon (mysqld) and many client programs and libraries. \n\nSecurity Fix(es): \n\n * openssl: SSL_select_next_proto buffer overread (CVE-2024-5535)\n * krb5: GSS message token handling (CVE-2024-37371)\n * curl: libcurl: ASN.1 date parser overread (CVE-2024-7264)\n * mysql: Thread Pooling unspecified vulnerability (CPU Oct 2024) (CVE-2024-21238)\n * mysql: X Plugin unspecified vulnerability (CPU Oct 2024) (CVE-2024-21196)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21241)\n * mysql: Client programs unspecified vulnerability (CPU Oct 2024) (CVE-2024-21231)\n * mysql: Information Schema unspecified vulnerability (CPU Oct 2024) (CVE-2024-21197)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21218)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21201)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21236)\n * mysql: Group Replication GCS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21237)\n * mysql: FTS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21203)\n * mysql: Health Monitor unspecified vulnerability (CPU Oct 2024) (CVE-2024-21212)\n * mysql: DML unspecified vulnerability (CPU Oct 2024) (CVE-2024-21219)\n * mysql: Optimizer unspecified vulnerability (CPU Oct 2024) (CVE-2024-21230)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21213)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21194)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21199)\n * mysql: PS unspecified vulnerability (CPU Oct 2024) (CVE-2024-21193)\n * mysql: DDL unspecified vulnerability (CPU Oct 2024) (CVE-2024-21198)\n * mysql: mysqldump unspecified vulnerability (CPU Oct 2024) (CVE-2024-21247)\n * mysql: InnoDB unspecified vulnerability (CPU Oct 2024) (CVE-2024-21239)\n * curl: curl netrc password leak (CVE-2024-11053)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21497)\n * mysql: MySQL Server Options Vulnerability (CVE-2025-21520)\n * mysql: High Privilege Denial of Service Vulnerability in MySQL Server (CVE-2025-21490)\n * mysql: Information Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21529)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21531)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21504)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21540)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21555)\n * mysql: Packaging unspecified vulnerability (CPU Jan 2025) (CVE-2025-21543)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21491)\n * mysql: DDL unspecified vulnerability (CPU Jan 2025) (CVE-2025-21525)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21536)\n * mysql: Thread Pooling unspecified vulnerability (CPU Jan 2025) (CVE-2025-21521)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21501)\n * mysql: Performance Schema unspecified vulnerability (CPU Jan 2025) (CVE-2025-21534)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21494)\n * mysql: Privileges unspecified vulnerability (CPU Jan 2025) (CVE-2025-21519)\n * mysql: Parser unspecified vulnerability (CPU Jan 2025) (CVE-2025-21522)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21503)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21518)\n * mysql: MySQL Server InnoDB Denial of Service and Unauthorized Data Modification Vulnerability (CVE-2025-21559)\n * mysql: Privilege Misuse in MySQL Server Security Component (CVE-2025-21546)\n * mysql: Optimizer unspecified vulnerability (CPU Jan 2025) (CVE-2025-21500)\n * mysql: InnoDB unspecified vulnerability (CPU Jan 2025) (CVE-2025-21523)\n * mysql: Components Services unspecified vulnerability (CPU Jan 2025) (CVE-2025-21505)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:1671",
"modified": "2025-02-20T14:55:32Z",
"published": "2025-02-19T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-11053"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21193"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21194"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21196"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21197"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21198"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21199"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21201"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21203"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21212"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21213"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21218"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21219"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21230"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21231"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21236"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21237"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21239"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21241"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-21247"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-37371"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-5535"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-7264"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21490"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21491"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21494"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21497"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21500"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21501"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21503"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21504"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21505"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21518"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21519"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21520"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21521"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21522"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21523"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21525"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21529"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21531"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21534"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21536"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21540"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21543"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21546"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21555"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-21559"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294581"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2294676"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2301888"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318857"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318858"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318870"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318873"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318874"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318876"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318882"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318883"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318884"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318885"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318886"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318897"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318900"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318905"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318914"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318922"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318923"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318925"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318926"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2318927"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2331191"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339218"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339220"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339221"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339226"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339231"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339236"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339238"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339243"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339247"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339252"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339259"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339266"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339270"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339271"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339275"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339277"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339281"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339284"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339291"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339293"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339295"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339299"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339300"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339304"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2339305"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-1671.html"
}
],
"related": [
"CVE-2024-5535",
"CVE-2024-37371",
"CVE-2024-7264",
"CVE-2024-21238",
"CVE-2024-21196",
"CVE-2024-21241",
"CVE-2024-21231",
"CVE-2024-21197",
"CVE-2024-21218",
"CVE-2024-21201",
"CVE-2024-21236",
"CVE-2024-21237",
"CVE-2024-21203",
"CVE-2024-21212",
"CVE-2024-21219",
"CVE-2024-21230",
"CVE-2024-21213",
"CVE-2024-21194",
"CVE-2024-21199",
"CVE-2024-21193",
"CVE-2024-21198",
"CVE-2024-21247",
"CVE-2024-21239",
"CVE-2024-11053",
"CVE-2025-21497",
"CVE-2025-21520",
"CVE-2025-21490",
"CVE-2025-21529",
"CVE-2025-21531",
"CVE-2025-21504",
"CVE-2025-21540",
"CVE-2025-21555",
"CVE-2025-21543",
"CVE-2025-21491",
"CVE-2025-21525",
"CVE-2025-21536",
"CVE-2025-21521",
"CVE-2025-21501",
"CVE-2025-21534",
"CVE-2025-21494",
"CVE-2025-21519",
"CVE-2025-21522",
"CVE-2025-21503",
"CVE-2025-21518",
"CVE-2025-21559",
"CVE-2025-21546",
"CVE-2025-21500",
"CVE-2025-21523",
"CVE-2025-21505"
],
"summary": "Important: mysql security update"
}
CVE-2024-21231
Vulnerability from fstec - Published: 07.12.2023{
"CVSS 2.0": "AV:N/AC:H/Au:S/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (\u0410\u043b\u044c\u0442 8 \u0421\u041f), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), \u0434\u043e 8.0.39 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), \u0434\u043e 8.4.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), \u0434\u043e 9.0.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.oracle.com/security-alerts/cpuoct2024.html\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0440\u0435\u043b\u0438\u0437 10): \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.12.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.02.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.10.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-08444",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-21231",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "\u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041b\u042c\u0422 \u0421\u041f 10, MySQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Client Programs \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Client Programs \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u043e\u0439 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c MySQL \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231\nhttps://vuldb.com/?id.280491\nhttps://www.cve.org/CVERecord?id=CVE-2024-21231\nhttps://www.oracle.com/security-alerts/cpuoct2024.html\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,1)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,1)"
}
GSD-2024-21231
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2024-21231",
"id": "GSD-2024-21231"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-21231"
],
"id": "GSD-2024-21231",
"modified": "2023-12-13T01:21:42.715097Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-21231",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
GHSA-JV2X-G26C-46CQ
Vulnerability from github – Published: 2024-10-15 21:30 – Updated: 2025-11-04 00:31Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).
{
"affected": [],
"aliases": [
"CVE-2024-21231"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-10-15T20:15:11Z",
"severity": "LOW"
},
"details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L).",
"id": "GHSA-jv2x-g26c-46cq",
"modified": "2025-11-04T00:31:35Z",
"published": "2024-10-15T21:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21231"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-21231
Vulnerability from fkie_nvd - Published: 2024-10-15 20:15 - Updated: 2025-11-03 22:16{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A",
"versionEndIncluding": "8.0.39",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB",
"versionEndIncluding": "8.4.2",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Client programs). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 3.1 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: programas cliente). Las versiones compatibles afectadas son 8.0.39 y anteriores, 8.4.2 y anteriores y 9.0.1 y anteriores. Esta vulnerabilidad, que es dif\u00edcil de explotar, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar una denegaci\u00f3n de servicio parcial (DOS parcial) de MySQL Server. Puntuaci\u00f3n base CVSS 3.1 3.1 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)."
}
],
"id": "CVE-2024-21231",
"lastModified": "2025-11-03T22:16:43.637",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2024-10-15T20:15:11.943",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.