The host is installed with Oracle MySQL Server through 5.6.44, 5.7.26 or 8.0.16 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server : Pluggable Auth. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 5.6.44, 5.7.26 or 8.0.16 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server : Compiling. Successful exploitation allows attackers to affect confidentiality.
The host is installed with Oracle MySQL Server through 5.6.44, 5.7.26 or 8.0.16 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Privileges. Successful exploitation allows attackers to affect integrity and availability.
The host is installed with Oracle MySQL Server through 5.6.44, 5.7.26 or 8.0.16 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: XML. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 5.7.26 or 8.0.16 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Audit Log. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Security: Roles. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Data Dictionary. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.12 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: GIS. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 8.0.16 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Options. Successful exploitation allows attackers to affect availability.
The host is installed with Oracle MySQL Server through 5.7.25 or 8.0.15 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Replication. Successful exploitation allows attackers to affect availability.