Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-21185 (GCVE-0-2024-21185)
Vulnerability from cvelistv5 – Published: 2024-07-16 22:40 – Updated: 2025-03-18 15:27- Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
| URL | Tags |
|---|---|
| https://www.oracle.com/security-alerts/cpujul2024.html | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | MySQL Server |
Affected:
8.0.38
Affected: 8.4.1 Affected: 9.0.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21185",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T19:02:51.775160Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-18T15:27:57.060Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:13:42.683Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240731-0005/"
},
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "8.0.38"
},
{
"status": "affected",
"version": "8.4.1"
},
{
"status": "affected",
"version": "9.0.0"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-07-16T22:40:11.998Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2024-21185",
"datePublished": "2024-07-16T22:40:11.998Z",
"dateReserved": "2023-12-07T22:28:10.688Z",
"dateUpdated": "2025-03-18T15:27:57.060Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-21185",
"date": "2026-05-19",
"epss": "0.00949",
"percentile": "0.76575"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC3BBBD8-071A-42AD-A1CF-BC0A6561818A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7A4DB66-3476-4321-B890-43D4B1B95021\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFEA6CB-D404-4759-B85F-3E3C130DEEDD\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son 8.0.38, 8.4.1 y 9.0.0. Una vulnerabilidad f\\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\\u00e9s de m\\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}]",
"id": "CVE-2024-21185",
"lastModified": "2024-11-21T08:53:57.030",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secalert_us@oracle.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 4.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 3.6}]}",
"published": "2024-07-16T23:15:23.260",
"references": "[{\"url\": \"https://www.oracle.com/security-alerts/cpujul2024.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240731-0005/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2024.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-21185\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2024-07-16T23:15:23.260\",\"lastModified\":\"2025-03-18T16:15:20.577\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son 8.0.38, 8.4.1 y 9.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC3BBBD8-071A-42AD-A1CF-BC0A6561818A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A4DB66-3476-4321-B890-43D4B1B95021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFEA6CB-D404-4759-B85F-3E3C130DEEDD\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpujul2024.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240731-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2024.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20240731-0005/\"}, {\"url\": \"https://www.oracle.com/security-alerts/cpujul2024.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:13:42.683Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21185\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-17T19:02:51.775160Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-17T19:02:59.882Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0.38\"}, {\"status\": \"affected\", \"version\": \"8.4.1\"}, {\"status\": \"affected\", \"version\": \"9.0.0\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2024.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2024-07-16T22:40:11.998Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21185\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-18T15:27:57.060Z\", \"dateReserved\": \"2023-12-07T22:28:10.688Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2024-07-16T22:40:11.998Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-0595
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MYSQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.38, 8.4.1 et 9.0.0 sans les derniers correctifs de sécurité pour la vulnérabilité CVE-2024-21185 | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.x sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Connectors versions 8.x sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Workbench versions antérieures à 8.0.38 | ||
| Oracle | MySQL | MySQL Cluster versions 7.5.x antérieures à 7.5.35, versions 7.6.x antérieures à 7.6.31, versions 8.0.x antérieures à 8.0.38, versions 8.4.x antérieures à 8.4.1 et versions 8.1.0 et 8.3.0 sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Server versions 8.0.x antérieures à 8.0.38, versions 8.2.x et 8.3.x sans les derniers correctifs de sécurité et versions 8.4.x antérieures à 8.4.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.38, 8.4.1 et 9.0.0 sans les derniers correctifs de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-21185",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 8.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions ant\u00e9rieures \u00e0 8.0.38",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.5.x ant\u00e9rieures \u00e0 7.5.35, versions 7.6.x ant\u00e9rieures \u00e0 7.6.31, versions 8.0.x ant\u00e9rieures \u00e0 8.0.38, versions 8.4.x ant\u00e9rieures \u00e0 8.4.1 et versions 8.1.0 et 8.3.0 sans les derniers correctifs de s\u00e9curit\u00e9 ",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.x ant\u00e9rieures \u00e0 8.0.38, versions 8.2.x et 8.3.x sans les derniers correctifs de s\u00e9curit\u00e9 et versions 8.4.x ant\u00e9rieures \u00e0 8.4.1",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-21176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21176"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2021-24112",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24112"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2024-21170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21170"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2024-22257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22257"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0595",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MYSQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL"
},
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024verbose",
"url": "https://www.oracle.com/security-alerts/cpujul2024verbose.html#MSQL"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2024-AVI-0595
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MYSQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.38, 8.4.1 et 9.0.0 sans les derniers correctifs de sécurité pour la vulnérabilité CVE-2024-21185 | ||
| Oracle | MySQL | MySQL Enterprise Monitor versions 8.x sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Connectors versions 8.x sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Workbench versions antérieures à 8.0.38 | ||
| Oracle | MySQL | MySQL Cluster versions 7.5.x antérieures à 7.5.35, versions 7.6.x antérieures à 7.6.31, versions 8.0.x antérieures à 8.0.38, versions 8.4.x antérieures à 8.4.1 et versions 8.1.0 et 8.3.0 sans les derniers correctifs de sécurité | ||
| Oracle | MySQL | MySQL Server versions 8.0.x antérieures à 8.0.38, versions 8.2.x et 8.3.x sans les derniers correctifs de sécurité et versions 8.4.x antérieures à 8.4.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.38, 8.4.1 et 9.0.0 sans les derniers correctifs de s\u00e9curit\u00e9 pour la vuln\u00e9rabilit\u00e9 CVE-2024-21185",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Monitor versions 8.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 8.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions ant\u00e9rieures \u00e0 8.0.38",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.5.x ant\u00e9rieures \u00e0 7.5.35, versions 7.6.x ant\u00e9rieures \u00e0 7.6.31, versions 8.0.x ant\u00e9rieures \u00e0 8.0.38, versions 8.4.x ant\u00e9rieures \u00e0 8.4.1 et versions 8.1.0 et 8.3.0 sans les derniers correctifs de s\u00e9curit\u00e9 ",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.x ant\u00e9rieures \u00e0 8.0.38, versions 8.2.x et 8.3.x sans les derniers correctifs de s\u00e9curit\u00e9 et versions 8.4.x ant\u00e9rieures \u00e0 8.4.1",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-21176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21176"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2021-24112",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24112"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2024-21170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21170"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2024-22257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22257"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0595",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MYSQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html#AppendixMSQL"
},
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujul2024verbose",
"url": "https://www.oracle.com/security-alerts/cpujul2024verbose.html#MSQL"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis - Published: 2025-10-13 - Updated: 2025-10-13
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
BDU:2024-08903
Vulnerability from fstec - Published: 07.12.2023{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 9 (Red Hat Enterprise Linux), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), 9.0.0 (MySQL Server), 8.0.38 (MySQL Server), 8.4.1 (MySQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle Corp.:\nhttps://www.oracle.com/security-alerts/cpujul2024.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2024-21185\n\n\u0414\u043b\u044f \u0410\u041b\u042c\u0422 \u0421\u041f 10 (\u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 c10f1):\n\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0440\u0435\u043b\u0438\u0437 10): \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.12.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "14.11.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "01.11.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-08903",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-21185",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041b\u042c\u0422 \u0421\u041f 10, MySQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Red Hat Inc. Red Hat Enterprise Linux 9 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 InnoDB \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 InnoDB \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e MySQL-\u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/security-alerts/cpujul2024.html\nhttps://vuldb.com/?id.271788\nhttps://access.redhat.com/security/cve/CVE-2024-21185\nhttps://cve.basealt.ru/\nhttps://www.cybersecurity-help.cz/vdb/SB20240718165\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)"
}
CNVD-2024-34736
Vulnerability from cnvd - Published: 2024-08-07用户可参考如下供应商提供的安全公告获得补丁信息: https://www.oracle.com/security-alerts/cpujul2024.html
| Name | ['Oracle MySQL Server 8.0.38', 'Oracle MySQL Server 8.4.1', 'Oracle MySQL Server 9.0.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-21185",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-21185"
}
},
"description": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\n\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4MySQL\u670d\u52a1\u5668\u5728\u672a\u7ecf\u6388\u6743\u7684\u60c5\u51b5\u4e0b\u6302\u8d77\u6216\u9891\u7e41\u91cd\u590d\u5d29\u6e83\uff08\u5b8c\u5168DOS\uff09\u3002",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://www.oracle.com/security-alerts/cpujul2024.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-34736",
"openTime": "2024-08-07",
"patchDescription": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\r\n\r\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4MySQL\u670d\u52a1\u5668\u5728\u672a\u7ecf\u6388\u6743\u7684\u60c5\u51b5\u4e0b\u6302\u8d77\u6216\u9891\u7e41\u91cd\u590d\u5d29\u6e83\uff08\u5b8c\u5168DOS\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2024-34736\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Server 8.0.38",
"Oracle MySQL Server 8.4.1",
"Oracle MySQL Server 9.0.0"
]
},
"referenceLink": "https://www.oracle.com/security-alerts/cpujul2024.html",
"serverity": "\u4e2d",
"submitTime": "2024-07-19",
"title": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2024-34736\uff09"
}
FKIE_CVE-2024-21185
Vulnerability from fkie_nvd - Published: 2024-07-16 23:15 - Updated: 2025-03-18 16:15| Vendor | Product | Version | |
|---|---|---|---|
| oracle | mysql_server | 8.0.38 | |
| oracle | mysql_server | 8.4.1 | |
| oracle | mysql_server | 9.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "EC3BBBD8-071A-42AD-A1CF-BC0A6561818A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A4DB66-3476-4321-B890-43D4B1B95021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBFEA6CB-D404-4759-B85F-3E3C130DEEDD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: InnoDB). Las versiones compatibles que se ven afectadas son 8.0.38, 8.4.1 y 9.0.0. Una vulnerabilidad f\u00e1cilmente explotable permite que un atacante con altos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa el servidor MySQL. Los ataques exitosos a esta vulnerabilidad pueden resultar en una capacidad no autorizada de provocar un bloqueo o una falla frecuentemente repetible (DOS completo) del servidor MySQL. CVSS 3.1 Puntuaci\u00f3n base 4.9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"id": "CVE-2024-21185",
"lastModified": "2025-03-18T16:15:20.577",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2024-07-16T23:15:23.260",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20240731-0005/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-C462-F76H-GQHF
Vulnerability from github – Published: 2024-07-17 00:32 – Updated: 2025-03-18 18:30Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
{
"affected": [],
"aliases": [
"CVE-2024-21185"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-07-16T23:15:23Z",
"severity": "MODERATE"
},
"details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.38, 8.4.1 and 9.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"id": "GHSA-c462-f76h-gqhf",
"modified": "2025-03-18T18:30:43Z",
"published": "2024-07-17T00:32:55Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21185"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20240731-0005"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2024-21185
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2024-21185",
"id": "GSD-2024-21185"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-21185"
],
"id": "GSD-2024-21185",
"modified": "2023-12-13T01:21:42.728406Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-21185",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
NCSC-2024-0303
Vulnerability from csaf_ncscnl - Published: 2024-07-17 13:54 - Updated: 2024-07-17 13:54| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:8.1.0:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.1.0:*:*:*:*:*:*:*
|
— | |
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Er zijn kwetsbaarheden verholpen in Oracle MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n* Denial-of-Service (DoS)\n* Toegang tot gevoelige gegevens\n* Toegang tot systeemgegevens\n* Manipulatie van gegevens\n* (Remote) code execution (Gebruikersrechten)",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates beschikbaar gesteld om de kwetsbaarheden te verhelpen. Zie de referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-24112"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37920"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52425"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6129"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0450"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-20996"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21125"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21127"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21129"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21130"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21134"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21135"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21137"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21142"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21157"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21159"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21160"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21162"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21163"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21165"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21166"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21170"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21171"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21173"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21176"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21177"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21179"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21185"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22257"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22262"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24549"
},
{
"category": "external",
"summary": "Source - nvd",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062"
},
{
"category": "external",
"summary": "Reference - oracle",
"url": "https://www.oracle.com/docs/tech/security-alerts/cpujul2024csaf.json"
},
{
"category": "external",
"summary": "Reference - cveprojectv5; ibm; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujul2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-07-17T13:54:56.036488Z",
"id": "NCSC-2024-0303",
"initial_release_date": "2024-07-17T13:54:56.036488Z",
"revision_history": [
{
"date": "2024-07-17T13:54:56.036488Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1503737",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-611599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-1503740",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-912112",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-1503309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:8.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-764939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-912114",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-912113",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-912115",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503882",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503876",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503822",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503836",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503842",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503856",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503835",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503878",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503888",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503866",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503851",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503843",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503823",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503837",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503880",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503887",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503855",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503862",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503853",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503845",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503818",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.5.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503869",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503860",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503885",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503872",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503871",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503849",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503841",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503831",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503840",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503848",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503859",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503868",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503873",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503881",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503861",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503808",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503830",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503854",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:7.6.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503863",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503847",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503857",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503877",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503883",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503832",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503858",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503850",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503824",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503821",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503828",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503846",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503865",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503886",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503864",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503839",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503811",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503814",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503807",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503813",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503806",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503816",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_ndb_cluster",
"product": {
"name": "mysql_ndb_cluster",
"product_id": "CSAFPID-1503801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_ndb_cluster:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-912117",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503653",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.0.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-611602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-912116",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503657",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:8.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-1503659",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-1503321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93497",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93495",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93492",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93491",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93490",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93489",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93488",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93487",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93486",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93485",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93484",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93483",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93482",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93480",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503875",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503884",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503829",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503870",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93479",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503827",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503815",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93478",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93477",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93476",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93474",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93473",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.5.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93472",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93471",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93470",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93469",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93468",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93467",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93466",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93465",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93464",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93463",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93462",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503834",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93461",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93460",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503874",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503867",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503833",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503852",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503825",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503819",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93459",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93458",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93457",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93456",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93455",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93454",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93453",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:7.6.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93339",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93337",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93336",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.10:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93335",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93334",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.12:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.13:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93332",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.14:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93331",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.15:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93330",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.16:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.17:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.18:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.19:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.20:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.21:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.23:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.24:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.25:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.27:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.28:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283963",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.29:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283962",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.30:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-283964",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.31:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-94333",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.32:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-248612",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.33:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-716944",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.34:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913003",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.35:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913004",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.36:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503879",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.37:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503922",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.38:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-93313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-912999",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913000",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.7:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913002",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.0.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913005",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913006",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-913007",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503844",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503921",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:8.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-1503920",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:9.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-24112",
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-24112",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-24112.json"
}
],
"title": "CVE-2021-24112"
},
{
"cve": "CVE-2023-6129",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-37920",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-37920",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-37920.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"notes": [
{
"category": "other",
"text": "Truncation of Security-relevant Information",
"title": "CWE-222"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-611599",
"CSAFPID-611602",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764763",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-48795",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-611599",
"CSAFPID-611602",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764763",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52425",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-52425",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-20996",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20996",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20996.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-20996"
},
{
"cve": "CVE-2024-21125",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21125",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21125.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21125"
},
{
"cve": "CVE-2024-21127",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21127",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21127.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21127"
},
{
"cve": "CVE-2024-21129",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21129"
},
{
"cve": "CVE-2024-21130",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21130"
},
{
"cve": "CVE-2024-21134",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21134",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21134.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21134"
},
{
"cve": "CVE-2024-21135",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21135"
},
{
"cve": "CVE-2024-21137",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21137",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21137.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21137"
},
{
"cve": "CVE-2024-21142",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21142",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21142.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21142"
},
{
"cve": "CVE-2024-21157",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21157",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21157.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21157"
},
{
"cve": "CVE-2024-21159",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21159",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21159.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21159"
},
{
"cve": "CVE-2024-21160",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21160",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21160.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21160"
},
{
"cve": "CVE-2024-21162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21162"
},
{
"cve": "CVE-2024-21163",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21163",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21163"
},
{
"cve": "CVE-2024-21165",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21165",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21165.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21165"
},
{
"cve": "CVE-2024-21166",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21166",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21166.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21166"
},
{
"cve": "CVE-2024-21170",
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21170",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21170.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21170"
},
{
"cve": "CVE-2024-21171",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21171",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21171.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21171"
},
{
"cve": "CVE-2024-21173",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21173",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21173.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21173"
},
{
"cve": "CVE-2024-21176",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21176",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21176.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21176"
},
{
"cve": "CVE-2024-21177",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21177",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21177.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21177"
},
{
"cve": "CVE-2024-21179",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21179",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21179.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21179"
},
{
"cve": "CVE-2024-21185",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21185",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21185.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-21185"
},
{
"cve": "CVE-2024-22257",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-22257"
},
{
"cve": "CVE-2024-22262",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-22262"
},
{
"cve": "CVE-2024-24549",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-24549"
},
{
"cve": "CVE-2024-25062",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25062",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-221160",
"CSAFPID-504250",
"CSAFPID-764289",
"CSAFPID-764290",
"CSAFPID-764939",
"CSAFPID-1503653",
"CSAFPID-1503657",
"CSAFPID-1503659",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-25062"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.