Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
connector j vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2015-2575
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and previous versions allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
Debian Debian Linux 8.0
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Mysql Mysql
6
CVSSv2
CVE-2022-21363
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Con...
Oracle Mysql Connectors
Quarkus Quarkus
NA
CVE-2022-44644
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in th...
Apache Linkis
NA
CVE-2022-39944
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefor...
Apache Linkis
NA
CVE-2022-44645
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. The...
Apache Linkis
1 Github repository
7.9
CVSSv2
CVE-2021-2471
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Con...
Oracle Communications Cloud Native Core Security Edge Protection Proxy 1.7.0
Oracle Mysql Connectors
Oracle Communications Cloud Native Core Console 1.9.0
Oracle Communications Cloud Native Core Policy 1.15.0
Oracle Communications Cloud Native Core Network Slice Selection Function 1.8.0
Quarkus Quarkus
3 Github repositories
NA
CVE-2023-21971
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Con...
Oracle Mysql Connectors
Oracle Communications Cloud Native Core Policy 22.4.0
Oracle Communications Cloud Native Core Policy 23.1.0
Oracle Communications Cloud Native Core Binding Support Function 22.4.0
Oracle Communications Cloud Native Core Binding Support Function 23.1.0
Netapp Snapcenter -
Netapp Oncommand Insight -
Netapp Active Iq Unified Manager -
1 Github repository
4
CVSSv2
CVE-2012-1696
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and previous versions allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
Oracle Mysql
Oracle Mysql 5.5.5
Oracle Mysql 5.5.20
Oracle Mysql 5.5.6
Oracle Mysql 5.5.2
Oracle Mysql 5.5.15
Oracle Mysql 5.5.10
Oracle Mysql 5.5.9
Oracle Mysql 5.1.46
Oracle Mysql 5.1.47
Mysql Mysql 5.1.23
Oracle Mysql 5.1.54
Oracle Mysql 5.1.55
Oracle Mysql 5.1.6
Oracle Mysql 5.1.3
Oracle Mysql 5.1.12
Oracle Mysql 5.1.17
Oracle Mysql 5.1
Mysql Mysql 5.1.32
Oracle Mysql 5.1.19
Oracle Mysql 5.1.20
Mysql Mysql Community Server 5.1.19
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2