Oracle

Mysql Server

260 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Published 20.10.2021 11:17:17
  • Last modified 21.11.2024 06:12:42

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multi...

  • EPSS 0.2%
  • Published 20.10.2021 11:17:06
  • Last modified 21.11.2024 06:12:37

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via mu...

  • EPSS 1.52%
  • Published 20.10.2021 11:16:57
  • Last modified 21.11.2024 06:12:34

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Windows). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple proto...

Exploit
  • EPSS 0.07%
  • Published 29.09.2021 20:15:08
  • Last modified 21.11.2024 05:50:59

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This ...

Exploit
  • EPSS 0.19%
  • Published 29.09.2021 20:15:08
  • Last modified 21.11.2024 05:50:59

When curl >= 7.20.0 and <= 7.78.0 connects to an IMAP or POP3 server to retrieve data using STARTTLS to upgrade to TLS security, the server can respond and send back multiple responses at once that curl caches. curl would then upgrade to TLS but not ...

Exploit
  • EPSS 0.35%
  • Published 23.09.2021 13:15:08
  • Last modified 09.06.2025 15:15:25

When sending data to an MQTT server, libcurl <= 7.73.0 and 7.78.0 could in some circumstances erroneously keep a pointer to an already freed memory area and both use that again in a subsequent call to send data and also free it *again*.

  • EPSS 2.75%
  • Published 24.08.2021 15:15:09
  • Last modified 21.11.2024 06:22:12

In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen...

Warning
  • EPSS 0.82%
  • Published 24.08.2021 15:15:09
  • Last modified 21.11.2024 06:22:13

ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the s...

Exploit
  • EPSS 0.16%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:55

When curl is instructed to download content using the metalink feature, thecontents is verified against a hash provided in the metalink XML file.The metalink XML file points out to the client how to get the same contentfrom a set of different URLs, p...

Exploit
  • EPSS 0.11%
  • Published 05.08.2021 21:15:11
  • Last modified 21.11.2024 05:50:55

When curl is instructed to get content using the metalink feature, and a user name and password are used to download the metalink XML file, those same credentials are then subsequently passed on to each of the servers from which curl will download or...