vulnerability
Red Hat: CVE-2021-2154: CVE-2021-2154 mysql: Server: DML unspecified vulnerability (CPU Apr 2021) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:N/A:P) | Apr 22, 2021 | Apr 27, 2022 | Jul 9, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:P)
Published
Apr 22, 2021
Added
Apr 27, 2022
Modified
Jul 9, 2025
Description
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-galeraredhat-upgrade-galera-debuginforedhat-upgrade-galera-debugsourceredhat-upgrade-judyredhat-upgrade-judy-debuginforedhat-upgrade-judy-debugsourceredhat-upgrade-mariadbredhat-upgrade-mariadb-backupredhat-upgrade-mariadb-backup-debuginforedhat-upgrade-mariadb-commonredhat-upgrade-mariadb-debuginforedhat-upgrade-mariadb-debugsourceredhat-upgrade-mariadb-develredhat-upgrade-mariadb-embeddedredhat-upgrade-mariadb-embedded-debuginforedhat-upgrade-mariadb-embedded-develredhat-upgrade-mariadb-errmsgredhat-upgrade-mariadb-gssapi-serverredhat-upgrade-mariadb-gssapi-server-debuginforedhat-upgrade-mariadb-oqgraph-engineredhat-upgrade-mariadb-oqgraph-engine-debuginforedhat-upgrade-mariadb-pamredhat-upgrade-mariadb-pam-debuginforedhat-upgrade-mariadb-serverredhat-upgrade-mariadb-server-debuginforedhat-upgrade-mariadb-server-galeraredhat-upgrade-mariadb-server-utilsredhat-upgrade-mariadb-server-utils-debuginforedhat-upgrade-mariadb-testredhat-upgrade-mariadb-test-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.