cvelist/2021/2xxx/CVE-2021-2011.json

94 lines
3.9 KiB
JSON
Raw Normal View History

2021-01-20 15:03:26 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secalert_us@oracle.com",
"ID": "CVE-2021-2011",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2021Jan Changes to be committed: modified: 2018/2xxx/CVE-2018-2587.json modified: 2020/14xxx/CVE-2020-14756.json modified: 2020/14xxx/CVE-2020-14803.json modified: 2020/2xxx/CVE-2020-2555.json modified: 2021/1xxx/CVE-2021-1993.json modified: 2021/1xxx/CVE-2021-1994.json modified: 2021/1xxx/CVE-2021-1995.json modified: 2021/1xxx/CVE-2021-1996.json modified: 2021/1xxx/CVE-2021-1997.json modified: 2021/1xxx/CVE-2021-1998.json modified: 2021/1xxx/CVE-2021-1999.json modified: 2021/2xxx/CVE-2021-2000.json modified: 2021/2xxx/CVE-2021-2001.json modified: 2021/2xxx/CVE-2021-2002.json modified: 2021/2xxx/CVE-2021-2003.json modified: 2021/2xxx/CVE-2021-2004.json modified: 2021/2xxx/CVE-2021-2005.json modified: 2021/2xxx/CVE-2021-2006.json modified: 2021/2xxx/CVE-2021-2007.json modified: 2021/2xxx/CVE-2021-2009.json modified: 2021/2xxx/CVE-2021-2010.json modified: 2021/2xxx/CVE-2021-2011.json modified: 2021/2xxx/CVE-2021-2012.json modified: 2021/2xxx/CVE-2021-2013.json modified: 2021/2xxx/CVE-2021-2014.json modified: 2021/2xxx/CVE-2021-2015.json modified: 2021/2xxx/CVE-2021-2016.json modified: 2021/2xxx/CVE-2021-2017.json modified: 2021/2xxx/CVE-2021-2018.json modified: 2021/2xxx/CVE-2021-2019.json modified: 2021/2xxx/CVE-2021-2020.json modified: 2021/2xxx/CVE-2021-2021.json modified: 2021/2xxx/CVE-2021-2022.json modified: 2021/2xxx/CVE-2021-2023.json modified: 2021/2xxx/CVE-2021-2024.json modified: 2021/2xxx/CVE-2021-2025.json modified: 2021/2xxx/CVE-2021-2026.json modified: 2021/2xxx/CVE-2021-2027.json modified: 2021/2xxx/CVE-2021-2028.json modified: 2021/2xxx/CVE-2021-2029.json modified: 2021/2xxx/CVE-2021-2030.json modified: 2021/2xxx/CVE-2021-2031.json modified: 2021/2xxx/CVE-2021-2032.json modified: 2021/2xxx/CVE-2021-2033.json modified: 2021/2xxx/CVE-2021-2034.json modified: 2021/2xxx/CVE-2021-2035.json modified: 2021/2xxx/CVE-2021-2036.json modified: 2021/2xxx/CVE-2021-2038.json modified: 2021/2xxx/CVE-2021-2039.json modified: 2021/2xxx/CVE-2021-2040.json modified: 2021/2xxx/CVE-2021-2041.json modified: 2021/2xxx/CVE-2021-2042.json modified: 2021/2xxx/CVE-2021-2043.json modified: 2021/2xxx/CVE-2021-2044.json modified: 2021/2xxx/CVE-2021-2045.json modified: 2021/2xxx/CVE-2021-2046.json modified: 2021/2xxx/CVE-2021-2047.json modified: 2021/2xxx/CVE-2021-2048.json modified: 2021/2xxx/CVE-2021-2049.json modified: 2021/2xxx/CVE-2021-2050.json modified: 2021/2xxx/CVE-2021-2051.json modified: 2021/2xxx/CVE-2021-2052.json modified: 2021/2xxx/CVE-2021-2054.json modified: 2021/2xxx/CVE-2021-2055.json modified: 2021/2xxx/CVE-2021-2056.json modified: 2021/2xxx/CVE-2021-2057.json modified: 2021/2xxx/CVE-2021-2058.json modified: 2021/2xxx/CVE-2021-2059.json modified: 2021/2xxx/CVE-2021-2060.json modified: 2021/2xxx/CVE-2021-2061.json modified: 2021/2xxx/CVE-2021-2062.json modified: 2021/2xxx/CVE-2021-2063.json modified: 2021/2xxx/CVE-2021-2064.json modified: 2021/2xxx/CVE-2021-2065.json modified: 2021/2xxx/CVE-2021-2066.json modified: 2021/2xxx/CVE-2021-2067.json modified: 2021/2xxx/CVE-2021-2068.json modified: 2021/2xxx/CVE-2021-2069.json modified: 2021/2xxx/CVE-2021-2070.json modified: 2021/2xxx/CVE-2021-2071.json modified: 2021/2xxx/CVE-2021-2072.json modified: 2021/2xxx/CVE-2021-2073.json modified: 2021/2xxx/CVE-2021-2074.json modified: 2021/2xxx/CVE-2021-2075.json modified: 2021/2xxx/CVE-2021-2076.json modified: 2021/2xxx/CVE-2021-2077.json modified: 2021/2xxx/CVE-2021-2078.json modified: 2021/2xxx/CVE-2021-2079.json modified: 2021/2xxx/CVE-2021-2080.json modified: 2021/2xxx/CVE-2021-2081.json modified: 2021/2xxx/CVE-2021-2082.json modified: 2021/2xxx/CVE-2021-2083.json modified: 2021/2xxx/CVE-2021-2084.json modified: 2021/2xxx/CVE-2021-2085.json modified: 2021/2xxx/CVE-2021-2086.json modified: 2021/2xxx/CVE-2021-2087.json modified: 2021/2xxx/CVE-2021-2088.json modified: 2021/2xxx/CVE-2021-2089.json modified: 2021/2xxx/CVE-2021-2090.json modified: 2021/2xxx/CVE-2021-2091.json modified: 2021/2xxx/CVE-2021-2092.json modified: 2021/2xxx/CVE-2021-2093.json modified: 2021/2xxx/CVE-2021-2094.json modified: 2021/2xxx/CVE-2021-2096.json modified: 2021/2xxx/CVE-2021-2097.json modified: 2021/2xxx/CVE-2021-2098.json modified: 2021/2xxx/CVE-2021-2099.json modified: 2021/2xxx/CVE-2021-2100.json modified: 2021/2xxx/CVE-2021-2101.json modified: 2021/2xxx/CVE-2021-2102.json modified: 2021/2xxx/CVE-2021-2103.json modified: 2021/2xxx/CVE-2021-2104.json modified: 2021/2xxx/CVE-2021-2105.json modified: 2021/2xxx/CVE-2021-2106.json modified: 2021/2xxx/CVE-2021-2107.json modified: 2021/2xxx/CVE-2021-2108.json modified: 2021/2xxx/CVE-2021-2109.json modified: 2021/2xxx/CVE-2021-2110.json modified: 2021/2xxx/CVE-2021-2111.json modified: 2021/2xxx/CVE-2021-2112.json modified: 2021/2xxx/CVE-2021-2113.json modified: 2021/2xxx/CVE-2021-2114.json modified: 2021/2xxx/CVE-2021-2115.json modified: 2021/2xxx/CVE-2021-2116.json modified: 2021/2xxx/CVE-2021-2117.json modified: 2021/2xxx/CVE-2021-2118.json modified: 2021/2xxx/CVE-2021-2119.json modified: 2021/2xxx/CVE-2021-2120.json modified: 2021/2xxx/CVE-2021-2121.json modified: 2021/2xxx/CVE-2021-2122.json modified: 2021/2xxx/CVE-2021-2123.json modified: 2021/2xxx/CVE-2021-2124.json modified: 2021/2xxx/CVE-2021-2125.json modified: 2021/2xxx/CVE-2021-2126.json modified: 2021/2xxx/CVE-2021-2127.json modified: 2021/2xxx/CVE-2021-2128.json modified: 2021/2xxx/CVE-2021-2129.json modified: 2021/2xxx/CVE-2021-2130.json modified: 2021/2xxx/CVE-2021-2131.json
2021-01-19 13:46:41 -08:00
{
2021-01-20 15:03:26 +00:00
"product": {
"product_data": [
{
"product_name": "MySQL Server",
"version": {
"version_data": [
{
"version_value": "5.7.32 and prior",
"version_affected": "="
},
{
"version_value": "8.0.22 and prior",
"version_affected": "="
}
]
}
}
]
},
"vendor_name": "Oracle Corporation"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2021Jan Changes to be committed: modified: 2018/2xxx/CVE-2018-2587.json modified: 2020/14xxx/CVE-2020-14756.json modified: 2020/14xxx/CVE-2020-14803.json modified: 2020/2xxx/CVE-2020-2555.json modified: 2021/1xxx/CVE-2021-1993.json modified: 2021/1xxx/CVE-2021-1994.json modified: 2021/1xxx/CVE-2021-1995.json modified: 2021/1xxx/CVE-2021-1996.json modified: 2021/1xxx/CVE-2021-1997.json modified: 2021/1xxx/CVE-2021-1998.json modified: 2021/1xxx/CVE-2021-1999.json modified: 2021/2xxx/CVE-2021-2000.json modified: 2021/2xxx/CVE-2021-2001.json modified: 2021/2xxx/CVE-2021-2002.json modified: 2021/2xxx/CVE-2021-2003.json modified: 2021/2xxx/CVE-2021-2004.json modified: 2021/2xxx/CVE-2021-2005.json modified: 2021/2xxx/CVE-2021-2006.json modified: 2021/2xxx/CVE-2021-2007.json modified: 2021/2xxx/CVE-2021-2009.json modified: 2021/2xxx/CVE-2021-2010.json modified: 2021/2xxx/CVE-2021-2011.json modified: 2021/2xxx/CVE-2021-2012.json modified: 2021/2xxx/CVE-2021-2013.json modified: 2021/2xxx/CVE-2021-2014.json modified: 2021/2xxx/CVE-2021-2015.json modified: 2021/2xxx/CVE-2021-2016.json modified: 2021/2xxx/CVE-2021-2017.json modified: 2021/2xxx/CVE-2021-2018.json modified: 2021/2xxx/CVE-2021-2019.json modified: 2021/2xxx/CVE-2021-2020.json modified: 2021/2xxx/CVE-2021-2021.json modified: 2021/2xxx/CVE-2021-2022.json modified: 2021/2xxx/CVE-2021-2023.json modified: 2021/2xxx/CVE-2021-2024.json modified: 2021/2xxx/CVE-2021-2025.json modified: 2021/2xxx/CVE-2021-2026.json modified: 2021/2xxx/CVE-2021-2027.json modified: 2021/2xxx/CVE-2021-2028.json modified: 2021/2xxx/CVE-2021-2029.json modified: 2021/2xxx/CVE-2021-2030.json modified: 2021/2xxx/CVE-2021-2031.json modified: 2021/2xxx/CVE-2021-2032.json modified: 2021/2xxx/CVE-2021-2033.json modified: 2021/2xxx/CVE-2021-2034.json modified: 2021/2xxx/CVE-2021-2035.json modified: 2021/2xxx/CVE-2021-2036.json modified: 2021/2xxx/CVE-2021-2038.json modified: 2021/2xxx/CVE-2021-2039.json modified: 2021/2xxx/CVE-2021-2040.json modified: 2021/2xxx/CVE-2021-2041.json modified: 2021/2xxx/CVE-2021-2042.json modified: 2021/2xxx/CVE-2021-2043.json modified: 2021/2xxx/CVE-2021-2044.json modified: 2021/2xxx/CVE-2021-2045.json modified: 2021/2xxx/CVE-2021-2046.json modified: 2021/2xxx/CVE-2021-2047.json modified: 2021/2xxx/CVE-2021-2048.json modified: 2021/2xxx/CVE-2021-2049.json modified: 2021/2xxx/CVE-2021-2050.json modified: 2021/2xxx/CVE-2021-2051.json modified: 2021/2xxx/CVE-2021-2052.json modified: 2021/2xxx/CVE-2021-2054.json modified: 2021/2xxx/CVE-2021-2055.json modified: 2021/2xxx/CVE-2021-2056.json modified: 2021/2xxx/CVE-2021-2057.json modified: 2021/2xxx/CVE-2021-2058.json modified: 2021/2xxx/CVE-2021-2059.json modified: 2021/2xxx/CVE-2021-2060.json modified: 2021/2xxx/CVE-2021-2061.json modified: 2021/2xxx/CVE-2021-2062.json modified: 2021/2xxx/CVE-2021-2063.json modified: 2021/2xxx/CVE-2021-2064.json modified: 2021/2xxx/CVE-2021-2065.json modified: 2021/2xxx/CVE-2021-2066.json modified: 2021/2xxx/CVE-2021-2067.json modified: 2021/2xxx/CVE-2021-2068.json modified: 2021/2xxx/CVE-2021-2069.json modified: 2021/2xxx/CVE-2021-2070.json modified: 2021/2xxx/CVE-2021-2071.json modified: 2021/2xxx/CVE-2021-2072.json modified: 2021/2xxx/CVE-2021-2073.json modified: 2021/2xxx/CVE-2021-2074.json modified: 2021/2xxx/CVE-2021-2075.json modified: 2021/2xxx/CVE-2021-2076.json modified: 2021/2xxx/CVE-2021-2077.json modified: 2021/2xxx/CVE-2021-2078.json modified: 2021/2xxx/CVE-2021-2079.json modified: 2021/2xxx/CVE-2021-2080.json modified: 2021/2xxx/CVE-2021-2081.json modified: 2021/2xxx/CVE-2021-2082.json modified: 2021/2xxx/CVE-2021-2083.json modified: 2021/2xxx/CVE-2021-2084.json modified: 2021/2xxx/CVE-2021-2085.json modified: 2021/2xxx/CVE-2021-2086.json modified: 2021/2xxx/CVE-2021-2087.json modified: 2021/2xxx/CVE-2021-2088.json modified: 2021/2xxx/CVE-2021-2089.json modified: 2021/2xxx/CVE-2021-2090.json modified: 2021/2xxx/CVE-2021-2091.json modified: 2021/2xxx/CVE-2021-2092.json modified: 2021/2xxx/CVE-2021-2093.json modified: 2021/2xxx/CVE-2021-2094.json modified: 2021/2xxx/CVE-2021-2096.json modified: 2021/2xxx/CVE-2021-2097.json modified: 2021/2xxx/CVE-2021-2098.json modified: 2021/2xxx/CVE-2021-2099.json modified: 2021/2xxx/CVE-2021-2100.json modified: 2021/2xxx/CVE-2021-2101.json modified: 2021/2xxx/CVE-2021-2102.json modified: 2021/2xxx/CVE-2021-2103.json modified: 2021/2xxx/CVE-2021-2104.json modified: 2021/2xxx/CVE-2021-2105.json modified: 2021/2xxx/CVE-2021-2106.json modified: 2021/2xxx/CVE-2021-2107.json modified: 2021/2xxx/CVE-2021-2108.json modified: 2021/2xxx/CVE-2021-2109.json modified: 2021/2xxx/CVE-2021-2110.json modified: 2021/2xxx/CVE-2021-2111.json modified: 2021/2xxx/CVE-2021-2112.json modified: 2021/2xxx/CVE-2021-2113.json modified: 2021/2xxx/CVE-2021-2114.json modified: 2021/2xxx/CVE-2021-2115.json modified: 2021/2xxx/CVE-2021-2116.json modified: 2021/2xxx/CVE-2021-2117.json modified: 2021/2xxx/CVE-2021-2118.json modified: 2021/2xxx/CVE-2021-2119.json modified: 2021/2xxx/CVE-2021-2120.json modified: 2021/2xxx/CVE-2021-2121.json modified: 2021/2xxx/CVE-2021-2122.json modified: 2021/2xxx/CVE-2021-2123.json modified: 2021/2xxx/CVE-2021-2124.json modified: 2021/2xxx/CVE-2021-2125.json modified: 2021/2xxx/CVE-2021-2126.json modified: 2021/2xxx/CVE-2021-2127.json modified: 2021/2xxx/CVE-2021-2128.json modified: 2021/2xxx/CVE-2021-2129.json modified: 2021/2xxx/CVE-2021-2130.json modified: 2021/2xxx/CVE-2021-2131.json
2021-01-19 13:46:41 -08:00
}
]
2021-01-20 15:03:26 +00:00
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)."
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2021Jan Changes to be committed: modified: 2018/2xxx/CVE-2018-2587.json modified: 2020/14xxx/CVE-2020-14756.json modified: 2020/14xxx/CVE-2020-14803.json modified: 2020/2xxx/CVE-2020-2555.json modified: 2021/1xxx/CVE-2021-1993.json modified: 2021/1xxx/CVE-2021-1994.json modified: 2021/1xxx/CVE-2021-1995.json modified: 2021/1xxx/CVE-2021-1996.json modified: 2021/1xxx/CVE-2021-1997.json modified: 2021/1xxx/CVE-2021-1998.json modified: 2021/1xxx/CVE-2021-1999.json modified: 2021/2xxx/CVE-2021-2000.json modified: 2021/2xxx/CVE-2021-2001.json modified: 2021/2xxx/CVE-2021-2002.json modified: 2021/2xxx/CVE-2021-2003.json modified: 2021/2xxx/CVE-2021-2004.json modified: 2021/2xxx/CVE-2021-2005.json modified: 2021/2xxx/CVE-2021-2006.json modified: 2021/2xxx/CVE-2021-2007.json modified: 2021/2xxx/CVE-2021-2009.json modified: 2021/2xxx/CVE-2021-2010.json modified: 2021/2xxx/CVE-2021-2011.json modified: 2021/2xxx/CVE-2021-2012.json modified: 2021/2xxx/CVE-2021-2013.json modified: 2021/2xxx/CVE-2021-2014.json modified: 2021/2xxx/CVE-2021-2015.json modified: 2021/2xxx/CVE-2021-2016.json modified: 2021/2xxx/CVE-2021-2017.json modified: 2021/2xxx/CVE-2021-2018.json modified: 2021/2xxx/CVE-2021-2019.json modified: 2021/2xxx/CVE-2021-2020.json modified: 2021/2xxx/CVE-2021-2021.json modified: 2021/2xxx/CVE-2021-2022.json modified: 2021/2xxx/CVE-2021-2023.json modified: 2021/2xxx/CVE-2021-2024.json modified: 2021/2xxx/CVE-2021-2025.json modified: 2021/2xxx/CVE-2021-2026.json modified: 2021/2xxx/CVE-2021-2027.json modified: 2021/2xxx/CVE-2021-2028.json modified: 2021/2xxx/CVE-2021-2029.json modified: 2021/2xxx/CVE-2021-2030.json modified: 2021/2xxx/CVE-2021-2031.json modified: 2021/2xxx/CVE-2021-2032.json modified: 2021/2xxx/CVE-2021-2033.json modified: 2021/2xxx/CVE-2021-2034.json modified: 2021/2xxx/CVE-2021-2035.json modified: 2021/2xxx/CVE-2021-2036.json modified: 2021/2xxx/CVE-2021-2038.json modified: 2021/2xxx/CVE-2021-2039.json modified: 2021/2xxx/CVE-2021-2040.json modified: 2021/2xxx/CVE-2021-2041.json modified: 2021/2xxx/CVE-2021-2042.json modified: 2021/2xxx/CVE-2021-2043.json modified: 2021/2xxx/CVE-2021-2044.json modified: 2021/2xxx/CVE-2021-2045.json modified: 2021/2xxx/CVE-2021-2046.json modified: 2021/2xxx/CVE-2021-2047.json modified: 2021/2xxx/CVE-2021-2048.json modified: 2021/2xxx/CVE-2021-2049.json modified: 2021/2xxx/CVE-2021-2050.json modified: 2021/2xxx/CVE-2021-2051.json modified: 2021/2xxx/CVE-2021-2052.json modified: 2021/2xxx/CVE-2021-2054.json modified: 2021/2xxx/CVE-2021-2055.json modified: 2021/2xxx/CVE-2021-2056.json modified: 2021/2xxx/CVE-2021-2057.json modified: 2021/2xxx/CVE-2021-2058.json modified: 2021/2xxx/CVE-2021-2059.json modified: 2021/2xxx/CVE-2021-2060.json modified: 2021/2xxx/CVE-2021-2061.json modified: 2021/2xxx/CVE-2021-2062.json modified: 2021/2xxx/CVE-2021-2063.json modified: 2021/2xxx/CVE-2021-2064.json modified: 2021/2xxx/CVE-2021-2065.json modified: 2021/2xxx/CVE-2021-2066.json modified: 2021/2xxx/CVE-2021-2067.json modified: 2021/2xxx/CVE-2021-2068.json modified: 2021/2xxx/CVE-2021-2069.json modified: 2021/2xxx/CVE-2021-2070.json modified: 2021/2xxx/CVE-2021-2071.json modified: 2021/2xxx/CVE-2021-2072.json modified: 2021/2xxx/CVE-2021-2073.json modified: 2021/2xxx/CVE-2021-2074.json modified: 2021/2xxx/CVE-2021-2075.json modified: 2021/2xxx/CVE-2021-2076.json modified: 2021/2xxx/CVE-2021-2077.json modified: 2021/2xxx/CVE-2021-2078.json modified: 2021/2xxx/CVE-2021-2079.json modified: 2021/2xxx/CVE-2021-2080.json modified: 2021/2xxx/CVE-2021-2081.json modified: 2021/2xxx/CVE-2021-2082.json modified: 2021/2xxx/CVE-2021-2083.json modified: 2021/2xxx/CVE-2021-2084.json modified: 2021/2xxx/CVE-2021-2085.json modified: 2021/2xxx/CVE-2021-2086.json modified: 2021/2xxx/CVE-2021-2087.json modified: 2021/2xxx/CVE-2021-2088.json modified: 2021/2xxx/CVE-2021-2089.json modified: 2021/2xxx/CVE-2021-2090.json modified: 2021/2xxx/CVE-2021-2091.json modified: 2021/2xxx/CVE-2021-2092.json modified: 2021/2xxx/CVE-2021-2093.json modified: 2021/2xxx/CVE-2021-2094.json modified: 2021/2xxx/CVE-2021-2096.json modified: 2021/2xxx/CVE-2021-2097.json modified: 2021/2xxx/CVE-2021-2098.json modified: 2021/2xxx/CVE-2021-2099.json modified: 2021/2xxx/CVE-2021-2100.json modified: 2021/2xxx/CVE-2021-2101.json modified: 2021/2xxx/CVE-2021-2102.json modified: 2021/2xxx/CVE-2021-2103.json modified: 2021/2xxx/CVE-2021-2104.json modified: 2021/2xxx/CVE-2021-2105.json modified: 2021/2xxx/CVE-2021-2106.json modified: 2021/2xxx/CVE-2021-2107.json modified: 2021/2xxx/CVE-2021-2108.json modified: 2021/2xxx/CVE-2021-2109.json modified: 2021/2xxx/CVE-2021-2110.json modified: 2021/2xxx/CVE-2021-2111.json modified: 2021/2xxx/CVE-2021-2112.json modified: 2021/2xxx/CVE-2021-2113.json modified: 2021/2xxx/CVE-2021-2114.json modified: 2021/2xxx/CVE-2021-2115.json modified: 2021/2xxx/CVE-2021-2116.json modified: 2021/2xxx/CVE-2021-2117.json modified: 2021/2xxx/CVE-2021-2118.json modified: 2021/2xxx/CVE-2021-2119.json modified: 2021/2xxx/CVE-2021-2120.json modified: 2021/2xxx/CVE-2021-2121.json modified: 2021/2xxx/CVE-2021-2122.json modified: 2021/2xxx/CVE-2021-2123.json modified: 2021/2xxx/CVE-2021-2124.json modified: 2021/2xxx/CVE-2021-2125.json modified: 2021/2xxx/CVE-2021-2126.json modified: 2021/2xxx/CVE-2021-2127.json modified: 2021/2xxx/CVE-2021-2128.json modified: 2021/2xxx/CVE-2021-2129.json modified: 2021/2xxx/CVE-2021-2130.json modified: 2021/2xxx/CVE-2021-2131.json
2021-01-19 13:46:41 -08:00
}
2021-01-20 15:03:26 +00:00
]
},
"impact": {
"cvss": {
"baseScore": "5.9",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
Bill Situ <Bill.Situ@Oracle.com> On branch cna/Oracle/CPU2021Jan Changes to be committed: modified: 2018/2xxx/CVE-2018-2587.json modified: 2020/14xxx/CVE-2020-14756.json modified: 2020/14xxx/CVE-2020-14803.json modified: 2020/2xxx/CVE-2020-2555.json modified: 2021/1xxx/CVE-2021-1993.json modified: 2021/1xxx/CVE-2021-1994.json modified: 2021/1xxx/CVE-2021-1995.json modified: 2021/1xxx/CVE-2021-1996.json modified: 2021/1xxx/CVE-2021-1997.json modified: 2021/1xxx/CVE-2021-1998.json modified: 2021/1xxx/CVE-2021-1999.json modified: 2021/2xxx/CVE-2021-2000.json modified: 2021/2xxx/CVE-2021-2001.json modified: 2021/2xxx/CVE-2021-2002.json modified: 2021/2xxx/CVE-2021-2003.json modified: 2021/2xxx/CVE-2021-2004.json modified: 2021/2xxx/CVE-2021-2005.json modified: 2021/2xxx/CVE-2021-2006.json modified: 2021/2xxx/CVE-2021-2007.json modified: 2021/2xxx/CVE-2021-2009.json modified: 2021/2xxx/CVE-2021-2010.json modified: 2021/2xxx/CVE-2021-2011.json modified: 2021/2xxx/CVE-2021-2012.json modified: 2021/2xxx/CVE-2021-2013.json modified: 2021/2xxx/CVE-2021-2014.json modified: 2021/2xxx/CVE-2021-2015.json modified: 2021/2xxx/CVE-2021-2016.json modified: 2021/2xxx/CVE-2021-2017.json modified: 2021/2xxx/CVE-2021-2018.json modified: 2021/2xxx/CVE-2021-2019.json modified: 2021/2xxx/CVE-2021-2020.json modified: 2021/2xxx/CVE-2021-2021.json modified: 2021/2xxx/CVE-2021-2022.json modified: 2021/2xxx/CVE-2021-2023.json modified: 2021/2xxx/CVE-2021-2024.json modified: 2021/2xxx/CVE-2021-2025.json modified: 2021/2xxx/CVE-2021-2026.json modified: 2021/2xxx/CVE-2021-2027.json modified: 2021/2xxx/CVE-2021-2028.json modified: 2021/2xxx/CVE-2021-2029.json modified: 2021/2xxx/CVE-2021-2030.json modified: 2021/2xxx/CVE-2021-2031.json modified: 2021/2xxx/CVE-2021-2032.json modified: 2021/2xxx/CVE-2021-2033.json modified: 2021/2xxx/CVE-2021-2034.json modified: 2021/2xxx/CVE-2021-2035.json modified: 2021/2xxx/CVE-2021-2036.json modified: 2021/2xxx/CVE-2021-2038.json modified: 2021/2xxx/CVE-2021-2039.json modified: 2021/2xxx/CVE-2021-2040.json modified: 2021/2xxx/CVE-2021-2041.json modified: 2021/2xxx/CVE-2021-2042.json modified: 2021/2xxx/CVE-2021-2043.json modified: 2021/2xxx/CVE-2021-2044.json modified: 2021/2xxx/CVE-2021-2045.json modified: 2021/2xxx/CVE-2021-2046.json modified: 2021/2xxx/CVE-2021-2047.json modified: 2021/2xxx/CVE-2021-2048.json modified: 2021/2xxx/CVE-2021-2049.json modified: 2021/2xxx/CVE-2021-2050.json modified: 2021/2xxx/CVE-2021-2051.json modified: 2021/2xxx/CVE-2021-2052.json modified: 2021/2xxx/CVE-2021-2054.json modified: 2021/2xxx/CVE-2021-2055.json modified: 2021/2xxx/CVE-2021-2056.json modified: 2021/2xxx/CVE-2021-2057.json modified: 2021/2xxx/CVE-2021-2058.json modified: 2021/2xxx/CVE-2021-2059.json modified: 2021/2xxx/CVE-2021-2060.json modified: 2021/2xxx/CVE-2021-2061.json modified: 2021/2xxx/CVE-2021-2062.json modified: 2021/2xxx/CVE-2021-2063.json modified: 2021/2xxx/CVE-2021-2064.json modified: 2021/2xxx/CVE-2021-2065.json modified: 2021/2xxx/CVE-2021-2066.json modified: 2021/2xxx/CVE-2021-2067.json modified: 2021/2xxx/CVE-2021-2068.json modified: 2021/2xxx/CVE-2021-2069.json modified: 2021/2xxx/CVE-2021-2070.json modified: 2021/2xxx/CVE-2021-2071.json modified: 2021/2xxx/CVE-2021-2072.json modified: 2021/2xxx/CVE-2021-2073.json modified: 2021/2xxx/CVE-2021-2074.json modified: 2021/2xxx/CVE-2021-2075.json modified: 2021/2xxx/CVE-2021-2076.json modified: 2021/2xxx/CVE-2021-2077.json modified: 2021/2xxx/CVE-2021-2078.json modified: 2021/2xxx/CVE-2021-2079.json modified: 2021/2xxx/CVE-2021-2080.json modified: 2021/2xxx/CVE-2021-2081.json modified: 2021/2xxx/CVE-2021-2082.json modified: 2021/2xxx/CVE-2021-2083.json modified: 2021/2xxx/CVE-2021-2084.json modified: 2021/2xxx/CVE-2021-2085.json modified: 2021/2xxx/CVE-2021-2086.json modified: 2021/2xxx/CVE-2021-2087.json modified: 2021/2xxx/CVE-2021-2088.json modified: 2021/2xxx/CVE-2021-2089.json modified: 2021/2xxx/CVE-2021-2090.json modified: 2021/2xxx/CVE-2021-2091.json modified: 2021/2xxx/CVE-2021-2092.json modified: 2021/2xxx/CVE-2021-2093.json modified: 2021/2xxx/CVE-2021-2094.json modified: 2021/2xxx/CVE-2021-2096.json modified: 2021/2xxx/CVE-2021-2097.json modified: 2021/2xxx/CVE-2021-2098.json modified: 2021/2xxx/CVE-2021-2099.json modified: 2021/2xxx/CVE-2021-2100.json modified: 2021/2xxx/CVE-2021-2101.json modified: 2021/2xxx/CVE-2021-2102.json modified: 2021/2xxx/CVE-2021-2103.json modified: 2021/2xxx/CVE-2021-2104.json modified: 2021/2xxx/CVE-2021-2105.json modified: 2021/2xxx/CVE-2021-2106.json modified: 2021/2xxx/CVE-2021-2107.json modified: 2021/2xxx/CVE-2021-2108.json modified: 2021/2xxx/CVE-2021-2109.json modified: 2021/2xxx/CVE-2021-2110.json modified: 2021/2xxx/CVE-2021-2111.json modified: 2021/2xxx/CVE-2021-2112.json modified: 2021/2xxx/CVE-2021-2113.json modified: 2021/2xxx/CVE-2021-2114.json modified: 2021/2xxx/CVE-2021-2115.json modified: 2021/2xxx/CVE-2021-2116.json modified: 2021/2xxx/CVE-2021-2117.json modified: 2021/2xxx/CVE-2021-2118.json modified: 2021/2xxx/CVE-2021-2119.json modified: 2021/2xxx/CVE-2021-2120.json modified: 2021/2xxx/CVE-2021-2121.json modified: 2021/2xxx/CVE-2021-2122.json modified: 2021/2xxx/CVE-2021-2123.json modified: 2021/2xxx/CVE-2021-2124.json modified: 2021/2xxx/CVE-2021-2125.json modified: 2021/2xxx/CVE-2021-2126.json modified: 2021/2xxx/CVE-2021-2127.json modified: 2021/2xxx/CVE-2021-2128.json modified: 2021/2xxx/CVE-2021-2129.json modified: 2021/2xxx/CVE-2021-2130.json modified: 2021/2xxx/CVE-2021-2131.json
2021-01-19 13:46:41 -08:00
}
2021-01-20 15:03:26 +00:00
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client."
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2021.html",
"refsource": "MISC",
"name": "https://www.oracle.com/security-alerts/cpujan2021.html"
2021-02-15 03:00:38 +00:00
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-db50ab62d3",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7EAHJPWOOF4D6PEFLXW5IQWRRSZ3HRC/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2021-b1d1655cef",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CS5THZSGI7O2CZO44NWYE57AG2T7NK3K/"
2021-05-26 12:00:44 +00:00
},
{
"refsource": "GENTOO",
"name": "GLSA-202105-27",
"url": "https://security.gentoo.org/glsa/202105-27"
2021-06-22 09:00:52 +00:00
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20210622-0001/",
"url": "https://security.netapp.com/advisory/ntap-20210622-0001/"
2021-01-20 15:03:26 +00:00
}
]
2020-12-09 21:03:31 +00:00
}
2021-01-20 15:03:26 +00:00
}