Page 3 of 91 results (0.007 seconds)

CVSS: 4.9EPSS: 0%CPEs: 12EXPL: 0

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.37 and prior and 8.0.28 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). • https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html https://security.netapp.com/advisory/ntap-20220429-0005 https://www.oracle.com/security-alerts/cpuapr2022.html https://access.redhat.com/security/cve/CVE-2022-21427 https://bugzilla.redhat.com/show_bug.cgi?id=2082644 •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 1

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148. Se ha detectado que MariaDB Server versiones v10.9 y anteriores, contienen un fallo de segmentación por medio del componente sql/item_func.cc:148 A flaw was found in the MariaDB Server. It contains a segmentation fault via the component, sql/item_func.cc:148, affecting availability. • https://jira.mariadb.org/browse/MDEV-28089 https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html https://security.netapp.com/advisory/ntap-20220526-0006 https://access.redhat.com/security/cve/CVE-2022-27449 https://bugzilla.redhat.com/show_bug.cgi?id=2075695 • CWE-617: Reachable Assertion •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 1

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc. Se ha detectado que MariaDB Server versiones v10.9 y anteriores, contienen un fallo de segmentación por medio del componente sql/sql_window.cc A flaw was found in the MariaDB Server. It contains a segmentation fault via the component, sql/sql_window.cc, impacting availability. • https://jira.mariadb.org/browse/MDEV-28081 https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html https://security.netapp.com/advisory/ntap-20220526-0006 https://access.redhat.com/security/cve/CVE-2022-27445 https://bugzilla.redhat.com/show_bug.cgi?id=2075691 •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 1

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc. Se ha detectado que MariaDB Server versiones v10.7 y anteriores, contienen un fallo de segmentación por medio del componente sql/sql_class.cc A flaw was found in the MariaDB Server. It contains a segmentation fault via the component, sql/sql_class.cc, impacting availability. • https://jira.mariadb.org/browse/MDEV-26406 https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html https://security.netapp.com/advisory/ntap-20220526-0004 https://access.redhat.com/security/cve/CVE-2022-27386 https://bugzilla.redhat.com/show_bug.cgi?id=2075005 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 1

MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements. Se ha detectado que MariaDB Server versiones v10.7 y anteriores, contienen un desbordamiento de búfer global en el componente decimal_bin_size, que es explotada por medio de sentencias SQL especialmente diseñadas A flaw was found in the MariaDB Server. It contains a global buffer overflow in the component, decimal_bin_size, which is exploited via specially crafted SQL statements, impacting availability. • https://jira.mariadb.org/browse/MDEV-26422 https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html https://security.netapp.com/advisory/ntap-20220526-0004 https://access.redhat.com/security/cve/CVE-2022-27387 https://bugzilla.redhat.com/show_bug.cgi?id=2075006 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •