In MySQL versions 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior a medium severity vulnerability CVE-2024-21219 was detected. This vulnerability allows high-privileged attackers to crash MySQL Server, causing a denial of service (DoS). To fix this problem, users should upgrade to versions 8.0.40, 8.4.3, or 9.0.2. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2024-21219.
Read more DatabaseIn MySQL versions 8.0.39 and prior, 8.4.2 and prior, and 9.0.1 and prior a medium severity vulnerability CVE-2024-21239 was detected. This vulnerability allows attackers to crash the MySQL server or make it unresponsive, disrupting access to data and services. To fix this issue, users should upgrade MySQL to versions 8.0.40, 8.4.3, or 9.0.2. For more details, visit https://nvd.nist.gov/vuln/detail/cve-2024-21239.
Read more DatabaseIn MySQL versions prior to 8.0.39, prior to 8.4.2, and prior to 9.0.1 a medium severity vulnerability CVE-2024-21238 was detected. This vulnerability allows attackers to cause the MySQL server to freeze or crash, preventing users from accessing their data and services. To fix this issue, users should upgrade MySQL to versions 8.0.40, 8.4.3, or 9.0.2. For more details, visit https://nvd.nist.gov/vuln/detail/cve-2024-21238.
Read more DatabaseIn MySQL versions 8.4.2 and prior, and 9.0.1 and prior a low severity vulnerability CVE-2024-21244 was detected. This vulnerability allows attackers with high privileges to gain unauthorized access to sensitive data in MySQL Server through various network protocols. To fix this issue, users should upgrade MySQL to versions 8.4.3 and later, 9.0.2 and later. For more details, visit https://nvd.nist.gov/vuln/detail/cve-2024-21244.
Read more DatabaseIn MySQL versions 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior a medium severity vulnerability CVE-2024-21241 was detected. This vulnerability in Oracle MySQL’s Server Optimizer allows a high-privileged attacker with network access to cause a denial of service (DoS) by crashing or hanging the MySQL server. Currently there’s no patch version for this vulnerability. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2024-21241.
Read more DatabaseIn Redis versions prior to 6.2.16, 7.2.6 and 7.4.1 a high severity vulnerability CVE-2024-31449 was detected. An authenticated user can exploit a vulnerability in Redis by using a crafted Lua script, potentially leading to remote code execution. Users are advised to upgrade to the latest version to mitigate this risk. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2024-31449.
Read more DatabaseIn Redis versions prior to 7.2.6 and 7.4.1 a medium severity vulnerability CVE-2024-31227 was detected. An authenticated user with sufficient privileges can create a malformed ACL selector in Redis, triggering a server panic and causing a denial of service. To fix this problem, users should upgrade to versions 7.2.6 and 7.4.1. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2024-31227.
Read more DatabaseIn Redis versions prior to 6.2.16, 7.2.6 and 7.4.1 a medium severity vulnerability CVE-2024-31228 was detected. Authenticated users can trigger a denial-of-service in Redis by using specially crafted long string match patterns on certain commands, leading to stack overflow and a process crash. To fix this problem, users should upgrade to versions 6.2.16, 7.2.6 and 7.4.1. For more details, visit https://nvd.nist.gov/vuln/detail/CVE-2024-31228.
Read more DatabaseIn SQLite version 0.1.1 a critical severity vulnerability CVE-2024-46488 was detected. This vulnerability allows attackers to trigger a heap buffer overflow using a specially crafted file, potentially causing a system Denial of Service (DoS). To fix this issue, users should upgrade SQLite to version 0.1.3. For more details, visit https://nvd.nist.gov/vuln/detail/cve-2024-46488.
Read more Database