CVE-2020-2922
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/04/2020
Last modified:
28/10/2022
Description
Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Impact
Base Score 3.x
3.70
Severity 3.x
LOW
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.6.0 (including) | 5.6.47 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 5.7.0 (including) | 5.7.29 (including) |
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:* | 8.0.0 (including) | 8.0.18 (including) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 5.5.0 (including) | 5.5.65 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.1.0 (including) | 10.1.41 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.2.0 (including) | 10.2.26 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.3.0 (including) | 10.3.17 (excluding) |
cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:* | 10.4.0 (including) | 10.4.7 (excluding) |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* | ||
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* | ||
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:* | 7.3 (including) | |
cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:* | 9.5 (including) | |
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page