python3-mysqlclient vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3-mysqlclient package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
NULL Pointer Dereference

<1.4.6-150100.3.3.7
  • M
Improper Locking

<1.4.6-150100.3.3.7
  • M
CVE-2022-32089

<1.4.6-150100.3.3.7
  • M
Use After Free

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • M
CVE-2022-32088

<1.4.6-150100.3.3.7
  • M
CVE-2022-32083

<1.4.6-150100.3.3.7
  • M
CVE-2022-32086

<1.4.6-150100.3.3.7
  • M
CVE-2022-32085

<1.4.6-150100.3.3.7
  • M
CVE-2022-32084

<1.4.6-150100.3.3.7
  • H
Reachable Assertion

<1.4.6-150100.3.3.7
  • H
CVE-2022-27451

<1.4.6-150100.3.3.7
  • M
Use After Free

<1.4.6-150100.3.3.7
  • H
SQL Injection

<1.4.6-150100.3.3.7
  • H
CVE-2022-27449

<1.4.6-150100.3.3.7
  • H
SQL Injection

<1.4.6-150100.3.3.7
  • M
CVE-2022-32087

<1.4.6-150100.3.3.7
  • H
CVE-2022-27446

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Reachable Assertion

<1.4.6-150100.3.3.7
  • H
Stack-based Buffer Overflow

<1.4.6-150100.3.3.7
  • H
SQL Injection

<1.4.6-150100.3.3.7
  • H
CVE-2022-27452

<1.4.6-150100.3.3.7
  • M
CVE-2022-21427

<1.4.6-150100.3.3.7
  • L
CVE-2021-46659

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
CVE-2022-27445

<1.4.6-150100.3.3.7
  • H
CVE-2022-27444

<1.4.6-150100.3.3.7
  • M
Buffer Overflow

<1.4.6-150100.3.3.7
  • M
CVE-2021-35604

<1.4.6-150100.3.3.7
  • H
SQL Injection

<1.4.6-150100.3.3.7
  • H
CVE-2021-46661

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
SQL Injection

<1.4.6-150100.3.3.7
  • H
Arbitrary Code Injection

<1.4.6-150100.3.3.7
  • H
SQL Injection

<1.4.6-150100.3.3.7
  • L
CVE-2021-46657

<1.4.6-150100.3.3.7
  • H
Heap-based Buffer Overflow

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Use After Free

<1.4.6-150100.3.3.7
  • H
Use of Externally-Controlled Format String

<1.4.6-150100.3.3.7
  • M
CVE-2021-2389

<1.4.6-150100.3.3.7
  • M
CVE-2022-21595

<1.4.6-150100.3.3.7
  • M
Resource Exhaustion

<1.4.6-150100.3.3.7
  • M
CVE-2021-46665

<1.4.6-150100.3.3.7
  • M
CVE-2020-2574

<1.4.6-150100.3.3.7
  • M
CVE-2021-2372

<1.4.6-150100.3.3.7
  • M
CVE-2020-2814

<1.4.6-150100.3.3.7
  • M
NULL Pointer Dereference

<1.4.6-150100.3.3.7
  • M
CVE-2020-14812

<1.4.6-150100.3.3.7
  • M
CVE-2020-2752

<1.4.6-150100.3.3.7
  • H
CVE-2021-46663

<1.4.6-150100.3.3.7
  • L
CVE-2021-46658

<1.4.6-150100.3.3.7
  • M
CVE-2020-14765

<1.4.6-150100.3.3.7
  • M
CVE-2019-2805

<1.4.6-150100.3.3.7
  • M
CVE-2020-14789

<1.4.6-150100.3.3.7
  • M
CVE-2021-2154

<1.4.6-150100.3.3.7
  • M
Link Following

<1.4.6-150100.3.3.7
  • M
CVE-2021-2166

<1.4.6-150100.3.3.7
  • H
Link Following

<1.4.6-150100.3.3.7
  • M
CVE-2020-2760

<1.4.6-150100.3.3.7
  • M
CVE-2019-2758

<1.4.6-150100.3.3.7
  • M
CVE-2020-2812

<1.4.6-150100.3.3.7
  • M
CVE-2019-2740

<1.4.6-150100.3.3.7
  • M
CVE-2019-2737

<1.4.6-150100.3.3.7
  • H
CVE-2019-2627

<1.4.6-150100.3.3.7
  • H
CVE-2019-2614

<1.4.6-150100.3.3.7
  • M
CVE-2018-3251

<1.4.6-150100.3.3.7
  • H
Arbitrary Command Injection

<1.4.6-150100.3.3.7
  • M
CVE-2020-14776

<1.4.6-150100.3.3.7
  • M
CVE-2018-3284

<1.4.6-150100.3.3.7
  • H
CVE-2019-2974

<1.4.6-150100.3.3.7
  • M
CVE-2018-3174

<1.4.6-150100.3.3.7
  • M
CVE-2020-13249

<1.4.6-150100.3.3.7
  • H
CVE-2019-2938

<1.4.6-150100.3.3.7
  • L
CVE-2018-3066

<1.4.6-150100.3.3.7
  • M
CVE-2018-3185

<1.4.6-150100.3.3.7
  • M
CVE-2018-3143

<1.4.6-150100.3.3.7
  • H
CVE-2019-2628

<1.4.6-150100.3.3.7
  • M
CVE-2019-2739

<1.4.6-150100.3.3.7
  • H
CVE-2018-3064

<1.4.6-150100.3.3.7
  • M
CVE-2018-3058

<1.4.6-150100.3.3.7
  • H
CVE-2018-2813

<1.4.6-150100.3.3.7
  • H
CVE-2019-2510

<1.4.6-150100.3.3.7
  • H
CVE-2019-2537

<1.4.6-150100.3.3.7
  • M
CVE-2018-3282

<1.4.6-150100.3.3.7
  • M
CVE-2018-3200

<1.4.6-150100.3.3.7
  • M
CVE-2018-3063

<1.4.6-150100.3.3.7
  • M
CVE-2018-3162

<1.4.6-150100.3.3.7
  • M
CVE-2018-3173

<1.4.6-150100.3.3.7
  • M
CVE-2018-3156

<1.4.6-150100.3.3.7
  • M
CVE-2018-3277

<1.4.6-150100.3.3.7
  • H
CVE-2018-2771

<1.4.6-150100.3.3.7
  • H
CVE-2018-2786

<1.4.6-150100.3.3.7
  • H
CVE-2018-2787

<1.4.6-150100.3.3.7
  • M
CVE-2018-3060

<1.4.6-150100.3.3.7
  • H
CVE-2018-2781

<1.4.6-150100.3.3.7
  • H
CVE-2018-2817

<1.4.6-150100.3.3.7
  • H
CVE-2018-2759

<1.4.6-150100.3.3.7
  • H
CVE-2018-2766

<1.4.6-150100.3.3.7
  • H
CVE-2018-2819

<1.4.6-150100.3.3.7
  • M
CVE-2018-2767

<1.4.6-150100.3.3.7
  • M
CVE-2018-2665

<1.4.6-150100.3.3.7
  • H
CVE-2018-2761

<1.4.6-150100.3.3.7
  • H
CVE-2018-2784

<1.4.6-150100.3.3.7
  • H
CVE-2018-2782

<1.4.6-150100.3.3.7
  • H
CVE-2018-2777

<1.4.6-150100.3.3.7
  • H
CVE-2018-2612

<1.4.6-150100.3.3.7
  • H
Out-of-bounds Write

<1.4.6-150100.3.3.7
  • H
CVE-2018-2562

<1.4.6-150100.3.3.7
  • H
CVE-2018-2810

<1.4.6-150100.3.3.7
  • L
CVE-2017-3653

<1.4.6-150100.3.3.7
  • M
CVE-2017-3464

<1.4.6-150100.3.3.7
  • M
CVE-2017-3641

<1.4.6-150100.3.3.7
  • M
CVE-2017-3636

<1.4.6-150100.3.3.7
  • H
CVE-2018-2755

<1.4.6-150100.3.3.7
  • M
CVE-2017-3453

<1.4.6-150100.3.3.7
  • M
CVE-2018-2668

<1.4.6-150100.3.3.7
  • L
CVE-2017-3313

<1.4.6-150100.3.3.7
  • M
CVE-2017-3291

<1.4.6-150100.3.3.7
  • L
CVE-2017-3317

<1.4.6-150100.3.3.7
  • M
CVE-2017-3309

<1.4.6-150100.3.3.7
  • M
CVE-2018-2640

<1.4.6-150100.3.3.7
  • M
CVE-2018-2622

<1.4.6-150100.3.3.7
  • M
CVE-2017-3265

<1.4.6-150100.3.3.7
  • M
Improper Input Validation

<1.4.6-150100.3.3.7
  • M
CVE-2017-3456

<1.4.6-150100.3.3.7
  • L
CVE-2017-3318

<1.4.6-150100.3.3.7
  • M
CVE-2017-3238

<1.4.6-150100.3.3.7
  • M
CVE-2017-3312

<1.4.6-150100.3.3.7
  • M
CVE-2017-3308

<1.4.6-150100.3.3.7
  • M
CVE-2017-10384

<1.4.6-150100.3.3.7
  • M
Use After Free

<1.4.6-150100.3.3.7
  • M
CVE-2017-10320

<1.4.6-150100.3.3.7
  • M
CVE-2017-3244

<1.4.6-150100.3.3.7
  • H
Access Restriction Bypass

<1.4.6-150100.3.3.7
  • M
Improper Privilege Management

<1.4.6-150100.3.3.7
  • L
CVE-2016-7440

<1.4.6-150100.3.3.7
  • M
Incorrect Authorization

<1.4.6-150100.3.3.7
  • M
CVE-2017-10365

<1.4.6-150100.3.3.7
  • M
CVE-2017-3243

<1.4.6-150100.3.3.7
  • M
CVE-2017-10378

<1.4.6-150100.3.3.7
  • M
CVE-2016-5616

<1.4.6-150100.3.3.7
  • M
CVE-2017-15365

<1.4.6-150100.3.3.7
  • M
CVE-2017-10286

<1.4.6-150100.3.3.7
  • M
CVE-2017-10268

<1.4.6-150100.3.3.7
  • M
CVE-2016-9843

<1.4.6-150100.3.3.7
  • M
CVE-2016-5626

<1.4.6-150100.3.3.7
  • M
CVE-2016-5629

<1.4.6-150100.3.3.7
  • M
CVE-2016-5624

<1.4.6-150100.3.3.7
  • H
Link Following

<1.4.6-150100.3.3.7
  • M
CVE-2016-8283

<1.4.6-150100.3.3.7
  • C
CVE-2016-0651

<1.4.6-150100.3.3.7
  • C
CVE-2016-0668

<1.4.6-150100.3.3.7
  • M
CVE-2016-3615

<1.4.6-150100.3.3.7
  • M
CVE-2016-5584

<1.4.6-150100.3.3.7
  • H
Race Condition

<1.4.6-150100.3.3.7
  • M
CVE-2016-3492

<1.4.6-150100.3.3.7
  • M
CVE-2016-5440

<1.4.6-150100.3.3.7
  • M
Security Features

<1.4.6-150100.3.3.7
  • H
CVE-2016-3521

<1.4.6-150100.3.3.7
  • C
CVE-2016-0644

<1.4.6-150100.3.3.7
  • H
CVE-2016-3477

<1.4.6-150100.3.3.7
  • C
CVE-2016-0641

<1.4.6-150100.3.3.7
  • C
CVE-2016-0649

<1.4.6-150100.3.3.7
  • C
CVE-2016-0646

<1.4.6-150100.3.3.7
  • C
CVE-2016-0642

<1.4.6-150100.3.3.7
  • C
CVE-2016-0650

<1.4.6-150100.3.3.7
  • M
CVE-2016-0616

<1.4.6-150100.3.3.7
  • M
CVE-2016-0610

<1.4.6-150100.3.3.7
  • M
CVE-2016-0640

<1.4.6-150100.3.3.7
  • M
CVE-2016-0606

<1.4.6-150100.3.3.7
  • M
CVE-2016-0608

<1.4.6-150100.3.3.7
  • M
CVE-2016-0609

<1.4.6-150100.3.3.7
  • M
CVE-2016-0598

<1.4.6-150100.3.3.7
  • M
CVE-2015-7744

<1.4.6-150100.3.3.7
  • M
CVE-2016-0597

<1.4.6-150100.3.3.7
  • M
CVE-2016-0600

<1.4.6-150100.3.3.7
  • M
CVE-2016-0596

<1.4.6-150100.3.3.7
  • M
CVE-2016-0505

<1.4.6-150100.3.3.7
  • H
CVE-2016-0546

<1.4.6-150100.3.3.7
  • H
CVE-2015-4913

<1.4.6-150100.3.3.7
  • H
CVE-2015-4870

<1.4.6-150100.3.3.7
  • H
CVE-2015-4879

<1.4.6-150100.3.3.7
  • L
Information Exposure

<1.4.6-150100.3.3.7
  • H
CVE-2015-4836

<1.4.6-150100.3.3.7
  • H
CVE-2015-4895

<1.4.6-150100.3.3.7
  • H
CVE-2015-4866

<1.4.6-150100.3.3.7
  • H
CVE-2015-4830

<1.4.6-150100.3.3.7
  • H
CVE-2015-4858

<1.4.6-150100.3.3.7
  • H
CVE-2015-4861

<1.4.6-150100.3.3.7
  • H
CVE-2015-4864

<1.4.6-150100.3.3.7
  • H
CVE-2015-4826

<1.4.6-150100.3.3.7
  • H
CVE-2015-4819

<1.4.6-150100.3.3.7
  • H
CVE-2015-4816

<1.4.6-150100.3.3.7
  • H
CVE-2015-4807

<1.4.6-150100.3.3.7
  • H
CVE-2015-4815

<1.4.6-150100.3.3.7
  • H
CVE-2015-4802

<1.4.6-150100.3.3.7
  • H
CVE-2015-4792

<1.4.6-150100.3.3.7
  • M
Insufficiently Protected Credentials

<1.4.6-150100.3.3.7
  • M
Link Following

<1.4.6-150100.3.3.7
  • M
Out-of-bounds Write

<1.4.6-150100.3.3.7
  • M
Information Exposure

<1.4.6-150100.3.3.7
  • M
Out-of-Bounds

<1.4.6-150100.3.3.7
  • M
SQL Injection

<1.4.6-150100.3.3.7
  • M
Link Following

<1.4.6-150100.3.3.7
  • L
CVE-2009-4019

<1.4.6-150100.3.3.7
  • M
Improper Input Validation

<1.4.6-150100.3.3.7
  • M
Link Following

<1.4.6-150100.3.3.7
  • M
Access Restriction Bypass

<1.4.6-150100.3.3.7
  • M
CVE-2007-6304

<1.4.6-150100.3.3.7
  • L
CVE-2007-6303

<1.4.6-150100.3.3.7
  • M
CVE-2007-5970

<1.4.6-150100.3.3.7
  • H
Access Restriction Bypass

<1.4.6-150100.3.3.7
  • M
Improper Input Validation

<1.4.6-150100.3.3.7
  • L
CVE-2006-4226

<1.4.6-150100.3.3.7
  • M
CVE-2006-0903

<1.4.6-150100.3.3.7