Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
connector j vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-2575
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and previous versions allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
Debian Debian Linux 8.0
Suse Linux Enterprise Software Development Kit 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Desktop 11
Mysql Mysql
6.6
CVSSv3
CVE-2022-21363
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Con...
Oracle Mysql Connectors
Quarkus Quarkus
6.5
CVSSv3
CVE-2022-44644
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J in the data source module, an authenticated attacker could read arbitrary local files by connecting a rogue MySQL server, By adding allowLoadLocalInfile to true in the JDBC parameter. Therefore, the parameters in th...
Apache Linkis
8.8
CVSSv3
CVE-2022-39944
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefor...
Apache Linkis
8.8
CVSSv3
CVE-2022-44645
In Apache Linkis <=1.3.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures new datasource with a MySQL data source and malicious parameters. The...
Apache Linkis
1 Github repository
5.9
CVSSv3
CVE-2021-2471
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Con...
Oracle Communications Cloud Native Core Security Edge Protection Proxy 1.7.0
Oracle Mysql Connectors
Oracle Communications Cloud Native Core Console 1.9.0
Oracle Communications Cloud Native Core Policy 1.15.0
Oracle Communications Cloud Native Core Network Slice Selection Function 1.8.0
Quarkus Quarkus
3 Github repositories
5.3
CVSSv3
CVE-2023-21971
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.32 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Con...
Oracle Mysql Connectors
Oracle Communications Cloud Native Core Policy 22.4.0
Oracle Communications Cloud Native Core Policy 23.1.0
Oracle Communications Cloud Native Core Binding Support Function 22.4.0
Oracle Communications Cloud Native Core Binding Support Function 23.1.0
Netapp Snapcenter -
Netapp Oncommand Insight -
Netapp Active Iq Unified Manager -
1 Github repository
NA
CVE-2012-1696
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.19 and previous versions allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer.
Oracle Mysql
Oracle Mysql 5.5.5
Oracle Mysql 5.5.20
Oracle Mysql 5.5.6
Oracle Mysql 5.5.2
Oracle Mysql 5.5.15
Oracle Mysql 5.5.10
Oracle Mysql 5.5.9
Oracle Mysql 5.1.46
Oracle Mysql 5.1.47
Mysql Mysql 5.1.23
Oracle Mysql 5.1.54
Oracle Mysql 5.1.55
Oracle Mysql 5.1.6
Oracle Mysql 5.1.3
Oracle Mysql 5.1.12
Oracle Mysql 5.1.17
Oracle Mysql 5.1
Mysql Mysql 5.1.32
Oracle Mysql 5.1.19
Oracle Mysql 5.1.20
Mysql Mysql Community Server 5.1.19
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2