7.1
CVSSv3

CVE-2022-21278

Published: 19/01/2022 Updated: 24/01/2022
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 7.1 | Impact Score: 4.2 | Exploitability Score: 2.8
VMScore: 490
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:P

Vulnerability Summary

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle mysql

netapp oncommand workflow automation -

netapp oncommand insight -

Vendor Advisories

Synopsis Moderate: mysql:80 security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for the mysql:80 module is now available for Red Hat Enterprise Linux 8Red Hat Product Secu ...
Synopsis Moderate: rh-mysql80-mysql security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic An update for rh-mysql80-mysql is now available for Red Hat Software CollectionsRed Hat Product ...
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer) Supported versions that are affected are 8026 and prior Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server Successful attacks of this vulnerability can result in unauthorize ...