mysql/mysql-server vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the https://github.com|mysql/mysql-server package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

[,8.0.36)
  • M
Denial of Service (DoS)

[,8.0.35)
  • M
Resource Exhaustion

[,8.0.36)
  • M
Denial of Service (DoS)

[,8.0.36)
  • M
Denial of Service (DoS)

[,8.0.35)
  • M
Denial of Service (DoS)

[,8.0.35)
  • M
Denial of Service (DoS)

[,8.0.35)
  • M
Denial of Service (DoS)

[,8.0.35)
  • M
Denial of Service (DoS)

[,8.0.35)
  • H
Denial of Service (DoS)

[,8.0.36)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Denial of Service (DoS)

[,8.2.1)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Improper Access Control

[,8.0.36)[8.0.0,8.2.1)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Improper Privilege Management

[,8.0.36)[8.0.0,8.2.1)
  • M
Race Condition

[,8.0.36)[8.0.0,8.2.1)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,8.0.36)[8.0.0,8.2.1)
  • M
NULL Pointer Dereference

[,8.0.36)[8.0.0,8.2.1)
  • M
NULL Pointer Dereference

[,8.0.36)[8.0.0,8.2.1)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,8.0.36)[8.0.0,8.2.1)
  • M
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

[,8.0.36)[8.0.0,8.2.1)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,8.0.36)[8.0.0,8.2.1)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,8.0.35)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Insufficient Resource Pool

[,8.0.36)[8.0.0,8.2.1)
  • M
Denial of Service (DoS)

[,8.0.36)[8.0.0,8.2.1)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Denial of Service (DoS)

[,8.0.34)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,8.0.34)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,5.7.43)[8.0.0,8.0.32)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,8.0.34)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,8.0.34)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,5.7.44)[8.0.0,8.0.32)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[,5.7.43)[8.0.0,8.0.32)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • L
Information Exposure

[,8.0.34)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Denial of Service (DoS)

[0,)
  • M
Uncontrolled Resource Consumption ('Resource Exhaustion')

[0,)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • L
Denial of Service (DoS)

[,5.7.41)[8.0.0,8.0.32)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • H
Access Control Bypass

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.33)
  • M
Denial of Service (DoS)

[,8.0.32)
  • M
Denial of Service (DoS)

[,8.0.31)
  • H
Denial of Service (DoS)

[,5.7.42)[8.0.0,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • H
Access Restriction Bypass

[,8.0.28)
  • M
Information Exposure

[,5.7.40)[8.0.0,8.0.17)
  • M
Information Exposure

[,5.7.40)[8.0.0,8.0.30)
  • M
Denial of Service (DoS)

[,5.7.37)[8.0.0,8.0.28)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,5.7.40)[8.0.0,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,5.7.40)[8.0.0,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.31)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • L
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Denial of Service (DoS)

[,8.0.30)
  • M
Access Restriction Bypass

[,8.0.29)
  • M
Denial of Service (DoS)

[,5.7.38)[8.0.0,8.0.29)
  • M
Denial of Service (DoS)

[,5.7.38)[8.0.0,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,5.7.38)[8.0.0,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,5.7.38)[8.0.0,8.0.29)
  • L
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,5.7.38)[8.0.0,8.0.29)
  • M
Denial of Service (DoS)

[,5.7.38)[8.0.0,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Information Exposure

[,8.0.29)
  • M
Information Exposure

[,5.7.38)[8.0.0,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.29)
  • M
Denial of Service (DoS)

[,8.0.28)
  • M
Denial of Service (DoS)

[,5.7.37)[8.0.0,8.0.28)