Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netapp
Netapp active Iq Unified Manager Netapp oncommand Insight Netapp oncommand Workflow Automation Netapp snapcenter |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Netapp
Netapp active Iq Unified Manager Netapp oncommand Insight Netapp oncommand Workflow Automation Netapp snapcenter |

Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2025-02-13T17:32:55.204Z
Reserved: 2023-12-07T22:28:10.645Z
Link: CVE-2024-21008

Updated: 2024-08-01T22:13:42.660Z

Status : Analyzed
Published: 2024-04-16T22:15:14.920
Modified: 2024-11-27T16:35:56.737
Link: CVE-2024-21008
