Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-21204 (GCVE-0-2024-21204)
Vulnerability from cvelistv5 – Published: 2024-10-15 19:52 – Updated: 2025-03-13 16:23- Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Oracle Corporation | MySQL Server |
Affected:
8.4.0
Affected: * , ≤ 9.0.1 (custom) cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21204",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-17T13:36:59.602519Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T16:23:45.386Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-11-01T17:03:05.745Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20241101-0009/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
],
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "8.4.0"
},
{
"lessThanOrEqual": "9.0.1",
"status": "affected",
"version": "*",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T19:52:39.622Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2024-21204",
"datePublished": "2024-10-15T19:52:39.622Z",
"dateReserved": "2023-12-07T22:28:10.689Z",
"dateUpdated": "2025-03-13T16:23:45.386Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F8752C4-11DC-4706-9995-846258D9B721\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD1DFA06-03A1-41E6-BF09-156C1084A811\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9067C169-3091-459A-A8C1-4E79152B18F5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: PS). Las versiones compatibles afectadas son 8.4.0 y 9.0.1 y anteriores. Esta vulnerabilidad, que se puede explotar f\\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\\u00e9s de m\\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server. Puntuaci\\u00f3n base de CVSS 3.1: 4,9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}]",
"id": "CVE-2024-21204",
"lastModified": "2024-11-21T08:53:58.270",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secalert_us@oracle.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 4.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 3.6}]}",
"published": "2024-10-15T20:15:08.673",
"references": "[{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20241101-0009/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-21204\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2024-10-15T20:15:08.673\",\"lastModified\":\"2025-03-13T17:15:27.480\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: PS). Las versiones compatibles afectadas son 8.4.0 y 9.0.1 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4,9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F8752C4-11DC-4706-9995-846258D9B721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1DFA06-03A1-41E6-BF09-156C1084A811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9067C169-3091-459A-A8C1-4E79152B18F5\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2024.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241101-0009/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20241101-0009/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-11-01T17:03:05.745Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21204\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-17T13:36:59.602519Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-17T13:37:02.711Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:oracle:mysql_server:8.4.0:*:*:*:*:*:*:*\", \"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*\"], \"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.4.0\"}, {\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.0.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2024-10-15T19:52:39.622Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21204\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-13T16:23:45.386Z\", \"dateReserved\": \"2023-12-07T22:28:10.689Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2024-10-15T19:52:39.622Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CNVD-2025-18129
Vulnerability from cnvd - Published: 2025-08-12厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpuoct2024.html
| Name | ['Oracle MySQL Server <=9.0.1', 'Oracle MySQL Server 8.4.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-21204",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-21204"
}
},
"description": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\n\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4MySQL Server\u6302\u8d77\u6216\u9891\u7e41\u91cd\u590d\u5d29\u6e83\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpuoct2024.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-18129",
"openTime": "2025-08-12",
"patchDescription": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\r\n\r\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4MySQL Server\u6302\u8d77\u6216\u9891\u7e41\u91cd\u590d\u5d29\u6e83\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-18129\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Server \u003c=9.0.1",
"Oracle MySQL Server 8.4.0"
]
},
"referenceLink": "https://access.redhat.com/security/cve/cve-2024-21204",
"serverity": "\u4e2d",
"submitTime": "2024-10-23",
"title": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-18129\uff09"
}
BDU:2024-09677
Vulnerability from fstec - Published: 15.10.2024{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9.0.1 (MySQL Server), 9.0.0 (MySQL Server), 8.4.0 (MySQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.oracle.com/security-alerts/cpuoct2024.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "15.11.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "15.11.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-09677",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-21204",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "MySQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: PS \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: PS \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 Oracle MySQL Server \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 MySQL",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/security-alerts/cpuoct2024.html\nhttps://www.cybersecurity-help.cz/vdb/SB20241015210\nhttps://vuldb.com/?id.280474",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)"
}
GSD-2024-21204
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2024-21204",
"id": "GSD-2024-21204"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-21204"
],
"id": "GSD-2024-21204",
"modified": "2023-12-13T01:21:42.675395Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-21204",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
WID-SEC-W-2024-3188
Vulnerability from csaf_certbund - Published: 2024-10-15 22:00 - Updated: 2025-06-10 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3188 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3188.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3188 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3188"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle MySQL vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0006 vom 2024-10-25",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0351-1 vom 2024-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7102-1 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7102-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1673 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1673 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1673.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1671 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1671.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1673 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1673"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7233600 vom 2025-05-15",
"url": "https://www.ibm.com/support/pages/node/7233600"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0006 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0006"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0009 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0009"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0007 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0007"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0005 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0005"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0009 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0009"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0008 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0008"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0007 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0007"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-10T22:00:00.000+00:00",
"generator": {
"date": "2025-06-11T06:26:42.340+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-3188",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von NetApp aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11.5",
"product": {
"name": "IBM Security Guardium 11.5",
"product_id": "1411051",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:11.5"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
},
{
"category": "product_version",
"name": "for Microsoft Windows",
"product": {
"name": "NetApp ActiveIQ Unified Manager for Microsoft Windows",
"product_id": "T025631",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows"
}
}
},
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T034126",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version",
"name": "8.4.0",
"product": {
"name": "Oracle MySQL 8.4.0",
"product_id": "T036237",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21193",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7264"
}
]
}
CERTFR-2024-AVI-0884
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 9.0.0 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.38 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 9.0.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.38 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21262"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21204"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0884",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2024",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
CERTFR-2024-AVI-0884
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 9.0.0 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.38 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 9.0.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.38 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21262"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21204"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0884",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2024",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
GHSA-99GW-CQ6G-RHMM
Vulnerability from github – Published: 2024-10-15 21:30 – Updated: 2025-03-13 18:32Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
{
"affected": [],
"aliases": [
"CVE-2024-21204"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-10-15T20:15:08Z",
"severity": "MODERATE"
},
"details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"id": "GHSA-99gw-cq6g-rhmm",
"modified": "2025-03-13T18:32:11Z",
"published": "2024-10-15T21:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21204"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241101-0009"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2024-21204
Vulnerability from fkie_nvd - Published: 2024-10-15 20:15 - Updated: 2025-03-13 17:15{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:8.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6F8752C4-11DC-4706-9995-846258D9B721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: PS). Supported versions that are affected are 8.4.0 and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: PS). Las versiones compatibles afectadas son 8.4.0 y 9.0.1 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetible (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4,9 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"id": "CVE-2024-21204",
"lastModified": "2025-03-13T17:15:27.480",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2024-10-15T20:15:08.673",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20241101-0009/"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
NCSC-2024-0420
Vulnerability from csaf_ncscnl - Published: 2024-10-17 13:20 - Updated: 2024-10-17 13:20| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-10-17T13:20:42.437738Z",
"id": "NCSC-2024-0420",
"initial_release_date": "2024-10-17T13:20:42.437738Z",
"revision_history": [
{
"date": "2024-10-17T13:20:42.437738Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-249429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1673522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_client",
"product": {
"name": "mysql_client",
"product_id": "CSAFPID-1673440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45853",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45853",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45853.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-45853"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-21193",
"references": [
{
"category": "self",
"summary": "CVE-2024-21193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21193.json"
}
],
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"references": [
{
"category": "self",
"summary": "CVE-2024-21194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21194.json"
}
],
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21197",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21198",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21198.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21199",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"references": [
{
"category": "self",
"summary": "CVE-2024-21204",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21204.json"
}
],
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21207.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21209.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.0,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21212.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21213",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21213.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21241.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21247.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"references": [
{
"category": "self",
"summary": "CVE-2024-21262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21262.json"
}
],
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"references": [
{
"category": "self",
"summary": "CVE-2024-21272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21272.json"
}
],
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"title": "CVE-2024-39689"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.