mysql-connector-python@8.0.5 vulnerabilities
A self-contained Python driver for communicating with MySQL servers, using an API that is compliant with the Python Database API Specification v2.0 (PEP 249).
-
latest version
9.1.0
-
latest non vulnerable version
-
first published
7 years ago
-
latest version published
a month ago
-
licenses detected
- [0,)
Direct Vulnerabilities
Known vulnerabilities in the mysql-connector-python package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
mysql-connector-python is a MySQL driver written in Python which does not depend on MySQL C client libraries and implements the DB API v2.0 specification (PEP-249). Affected versions of this package are vulnerable to SQL Injection due to improper sanitization of schema and table names. How to fix SQL Injection? Upgrade |
[,8.0.11)
|
mysql-connector-python is a MySQL driver written in Python which does not depend on MySQL C client libraries and implements the DB API v2.0 specification (PEP-249). Affected versions of this package are vulnerable to Access Control Bypass via multiple protocols. An attacker can take over the MySQL Connectors by exploiting network access with low privileges. How to fix Access Control Bypass? Upgrade |
[,9.1.0)
|
mysql-connector-python is a MySQL driver written in Python which does not depend on MySQL C client libraries and implements the DB API v2.0 specification (PEP-249). Affected versions of this package are vulnerable to Denial of Service (DoS) allowing an unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Connectors. How to fix Denial of Service (DoS)? Upgrade |
[,8.4.0)
|
mysql-connector-python is a MySQL driver written in Python which does not depend on MySQL C client libraries and implements the DB API v2.0 specification (PEP-249). Affected versions of this package are vulnerable to Improper Access Control. An unauthenticated attacker with network access via TLS could compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. It could result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data. How to fix Improper Access Control? Upgrade |
[,8.0.14)
|