Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 06 Dec 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Netapp
Netapp active Iq Unified Manager Netapp oncommand Insight Netapp oncommand Workflow Automation Netapp snapcenter Oracle mysql |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:* cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:* cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Netapp
Netapp active Iq Unified Manager Netapp oncommand Insight Netapp oncommand Workflow Automation Netapp snapcenter Oracle mysql |

Status: PUBLISHED
Assigner: oracle
Published:
Updated: 2025-02-13T17:33:05.630Z
Reserved: 2023-12-07T22:28:10.663Z
Link: CVE-2024-21062

Updated: 2024-08-01T22:13:42.343Z

Status : Analyzed
Published: 2024-04-16T22:15:24.247
Modified: 2024-12-06T19:28:18.863
Link: CVE-2024-21062
