2022-01-19 | CVE-2022-21368 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Components Services). | 6.5 |
2022-01-19 | CVE-2022-21370 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). | 4.0 |
2022-01-19 | CVE-2022-21372 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). | 4.0 |
2022-01-19 | CVE-2022-21374 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). | 4.0 |
2022-01-19 | CVE-2022-21378 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). | 5.5 |
2022-01-19 | CVE-2022-21379 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). | 4.0 |
2022-01-19 | CVE-2022-21380 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). | 4.0 |
2021-12-09 | CVE-2021-29678 | Incorrect Authorization vulnerability in multiple products IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 could allow a user with DBADM authority to access other databases and read or modify files. | 5.5 |
2021-12-09 | CVE-2021-38931 | Exposure of Resource to Wrong Sphere vulnerability in multiple products IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.1, and 11.5 is vulnerable to an information disclosure as a result of a connected user having indirect read access to a table where they are not authorized to select from. | 4.0 |
2021-12-09 | CVE-2021-39002 | Use of a Broken or Risky Cryptographic Algorithm vulnerability in multiple products IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, 11.1, and 11.5 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | 5.0 |