Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netapp
Netapp active Iq Unified Manager Netapp oncommand Insight Netapp oncommand Workflow Automation Netapp snapcenter |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Netapp
Netapp active Iq Unified Manager Netapp oncommand Insight Netapp oncommand Workflow Automation Netapp snapcenter |

Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2025-02-13T17:32:55.784Z
Reserved: 2023-12-07T22:28:10.646Z
Link: CVE-2024-21009

Updated: 2024-08-01T22:13:42.323Z

Status : Analyzed
Published: 2024-04-16T22:15:15.090
Modified: 2024-11-27T16:35:46.023
Link: CVE-2024-21009
