CVE-2024-41433
- EPSS 0.13%
- Veröffentlicht 03.09.2024 21:15:16
- Zuletzt bearbeitet 04.09.2025 18:49:26
PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component expression.ExplainExpressionList. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. NOTE: PingCAP maintains that the actual re...
CVE-2024-41434
- EPSS 0.1%
- Veröffentlicht 03.09.2024 20:15:07
- Zuletzt bearbeitet 04.09.2025 18:48:19
PingCAP TiDB v8.1.0 was discovered to contain a buffer overflow via the component (*Column).GetDecimal. This allows attackers to cause a Denial of Service (DoS) via a crafted input to the 'RemoveUnnecessaryFirstRow', it will check the expression betw...
CVE-2024-37820
- EPSS 0.12%
- Veröffentlicht 25.06.2024 19:15:11
- Zuletzt bearbeitet 21.11.2024 19:15:09
A nil pointer dereference in PingCAP TiDB v8.2.0-alpha-216-gfe5858b allows attackers to crash the application via expression.inferCollation.
CVE-2024-33809
- EPSS 0.19%
- Veröffentlicht 24.05.2024 15:15:24
- Zuletzt bearbeitet 10.06.2025 18:41:45
PingCAP TiDB v7.5.1 was discovered to contain a buffer overflow vulnerability, which could lead to database crashes and denial of service attacks.
CVE-2024-35618
- EPSS 0.15%
- Veröffentlicht 24.05.2024 15:15:24
- Zuletzt bearbeitet 10.06.2025 17:30:59
PingCAP TiDB v7.5.1 was discovered to contain a NULL pointer dereference via the component SortedRowContainer.
CVE-2022-3023
- EPSS 0.17%
- Veröffentlicht 04.11.2022 12:15:14
- Zuletzt bearbeitet 21.11.2024 07:18:39
Use of Externally-Controlled Format String in GitHub repository pingcap/tidb prior to 6.4.0, 6.1.3.
CVE-2022-34969
- EPSS 0.28%
- Veröffentlicht 03.08.2022 02:15:07
- Zuletzt bearbeitet 21.11.2024 07:10:30
PingCAP TiDB v6.1.0 was discovered to contain a NULL pointer dereference.
CVE-2022-31011
- EPSS 0.07%
- Veröffentlicht 31.05.2022 20:15:08
- Zuletzt bearbeitet 21.11.2024 07:03:42
TiDB is an open-source NewSQL database that supports Hybrid Transactional and Analytical Processing (HTAP) workloads. Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resultin...