Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

mysql

About This Vendor

mysql is a technology vendor producing software and infrastructure products. As a software provider, mysql's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of mysql's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 112 known vulnerabilities from mysql. This includes 18 high-severity issues requiring prompt remediation. These vulnerabilities affect 21 distinct products across mysql's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2001 through 2017, indicating decades of continuous security attention and research. Organizations deploying mysql products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2001-1255 2001-10-02 2025-04-03 - 4.6 Unknown
CVE-2003-0780 2003-09-22 2025-04-03 - 9.0 Likely
CVE-2003-1480 2003-12-31 2025-04-03 - 4.3 Likely
CVE-2004-0381 2004-05-04 2025-04-03 - 2.1 Unknown
CVE-2004-0835 2004-11-03 2025-04-03 - 7.5 Likely
CVE-2004-0837 2004-11-03 2025-04-03 - 2.6 Unknown
CVE-2004-0627 2004-12-06 2025-04-03 - 10.0 Likely
CVE-2004-0628 2004-12-06 2025-04-03 - 10.0 Likely
CVE-2004-0931 2004-12-31 2025-04-03 - 5.0 Likely
CVE-2004-1168 2005-01-10 2025-04-03 - 10.0 Likely
CVE-2004-1169 2005-01-10 2025-04-03 - 5.0 Likely
CVE-2005-0111 2005-01-13 2025-04-03 - 7.5 Likely
CVE-2005-0081 2005-04-14 2025-04-03 - 5.0 Likely
CVE-2005-0082 2005-04-14 2025-04-03 - 5.0 Likely
CVE-2005-0684 2005-04-25 2025-04-03 - 10.0 Likely
CVE-2005-1274 2005-04-26 2025-04-03 - 10.0 Likely
CVE-2005-0083 2005-05-02 2025-04-03 - 5.0 Likely
CVE-2005-0709 2005-05-02 2025-04-03 - 4.6 Unknown
CVE-2005-0710 2005-05-02 2025-04-03 - 4.6 Unknown
CVE-2005-0711 2005-05-02 2025-04-03 - 2.1 Unknown
CVE-2005-1636 2005-05-17 2025-04-03 - 4.6 Unknown
CVE-2005-2558 2005-08-16 2025-04-03 - 4.6 Unknown
CVE-2005-2573 2005-08-16 2025-04-03 - 5.0 Likely
CVE-2005-2467 2005-12-31 2025-04-03 - 5.8 Likely
CVE-2005-2468 2005-12-31 2025-04-03 - 6.4 Likely
CVE-2006-0903 2006-02-27 2025-04-03 - 4.6 Unknown
CVE-2006-1516 2006-05-05 2025-04-03 - 5.0 Likely
CVE-2006-1517 2006-05-05 2025-04-03 - 5.0 Likely
CVE-2006-1518 2006-05-05 2025-04-03 - 6.5 Likely
CVE-2006-2753 2006-06-01 2025-04-03 - 7.5 Likely
CVE-2006-3081 2006-06-19 2025-04-03 - 4.0 Likely
CVE-2006-3486 2006-07-10 2025-04-03 - 2.1 Unknown
CVE-2006-3469 2006-07-21 2025-04-03 - 4.0 Likely
CVE-2006-4031 2006-08-09 2025-04-03 - 2.1 Unknown
CVE-2006-4226 2006-08-18 2025-04-03 - 3.6 Unknown
CVE-2006-4227 2006-08-18 2025-04-03 - 6.5 Likely
CVE-2006-4380 2006-08-28 2025-04-03 - 2.1 Unknown
CVE-2006-4305 2006-08-30 2025-04-03 - 10.0 Likely
CVE-2006-7232 2006-12-31 2025-04-09 - 3.5 Unknown
CVE-2007-1420 2007-03-12 2025-04-09 - 2.1 Unknown
CVE-2007-2691 2007-05-16 2025-04-09 - 4.9 Unknown
CVE-2007-2692 2007-05-16 2025-04-09 - 6.0 Unknown
CVE-2007-2693 2007-05-16 2025-04-09 - 3.5 Unknown
CVE-2007-3780 2007-07-15 2025-04-09 - 5.0 Likely
CVE-2007-3781 2007-07-15 2025-04-09 - 4.0 Likely
CVE-2007-3782 2007-07-15 2025-04-09 - 3.5 Unknown
CVE-2007-5925 2007-11-10 2025-04-09 - 4.0 Likely
CVE-2007-5969 2007-12-10 2025-04-09 - 7.1 Unknown
CVE-2007-6303 2007-12-10 2025-04-09 - 3.5 Unknown
CVE-2007-6304 2007-12-10 2025-04-09 - 5.0 Likely
CVE-2008-0226 2008-01-10 2025-04-09 - 7.5 Likely
CVE-2007-6313 2008-02-18 2025-04-09 - 6.5 Likely
CVE-2008-2079 2008-05-05 2025-04-09 - 4.6 Unknown
CVE-2008-3963 2008-09-11 2025-04-09 - 4.0 Likely
CVE-2008-4098 2008-09-18 2025-04-09 - 4.6 Unknown
CVE-2008-4456 2008-10-06 2025-04-09 - 2.6 Unknown
CVE-2009-0819 2009-03-05 2025-04-09 - 4.0 Likely
CVE-2009-2446 2009-07-13 2025-04-09 - 8.5 Unknown
CVE-2009-2942 2009-10-22 2025-04-09 - 7.5 Likely
CVE-2008-7247 2009-11-30 2025-04-09 - 6.0 Unknown
CVE-2009-4019 2009-11-30 2025-04-09 - 4.0 Likely
CVE-2009-4028 2009-11-30 2025-04-09 - 6.8 Likely
CVE-2009-4030 2009-11-30 2025-04-09 - 4.4 Unknown
CVE-2010-1621 2010-05-14 2025-04-11 - 5.0 Likely
CVE-2010-1626 2010-05-21 2025-04-11 - 3.6 Unknown
CVE-2010-1848 2010-06-08 2025-04-11 - 6.5 Likely
CVE-2010-1849 2010-06-08 2025-04-11 - 5.0 Likely
CVE-2010-1850 2010-06-08 2025-04-11 - 6.0 Unknown
CVE-2010-3676 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3677 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3678 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3679 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3680 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3681 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3682 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3683 2011-01-11 2025-04-11 - 4.0 Likely
CVE-2010-3833 2011-01-14 2025-04-11 - 5.0 Likely
CVE-2010-3834 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2010-3835 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2010-3836 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2010-3837 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2010-3838 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2010-3839 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2010-3840 2011-01-14 2025-04-11 - 4.0 Likely
CVE-2011-2262 2012-01-18 2025-04-11 - 5.0 Likely
CVE-2012-0075 2012-01-18 2025-04-11 - 1.7 Unknown
CVE-2012-0087 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0101 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0102 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0112 2012-01-18 2025-04-11 - 3.5 Unknown
CVE-2012-0113 2012-01-18 2025-04-11 - 5.5 Likely
CVE-2012-0114 2012-01-18 2025-04-11 - 3.0 Unknown
CVE-2012-0115 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0116 2012-01-18 2025-04-11 - 4.9 Unknown
CVE-2012-0118 2012-01-18 2025-04-11 - 4.9 Unknown
CVE-2012-0119 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0120 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0484 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0485 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0490 2012-01-18 2025-04-11 - 4.0 Likely
CVE-2012-0492 2012-01-18 2025-04-11 - 2.1 Unknown
CVE-2012-0583 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2012-1696 2012-05-03 2025-04-11 - 4.0 Likely
CVE-2009-5026 2012-08-17 2025-04-11 - 6.8 Likely
CVE-2012-2102 2012-08-17 2025-04-11 - 3.5 Unknown
CVE-2012-2749 2012-08-17 2025-04-11 - 4.0 Likely
CVE-2012-0882 2012-12-21 2025-04-11 - 7.5 Likely
CVE-2012-0553 2013-03-28 2025-04-11 - 7.5 Likely
CVE-2013-1492 2013-03-28 2025-04-11 - 7.5 Likely
CVE-2015-2575 2015-04-16 2025-04-12 - 4.9 Unknown
CVE-2017-12419 2017-08-05 2025-04-20 4.9 4.0 Likely
CVE-2017-15945 2017-10-27 2025-04-20 7.8 7.2 Unknown

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for mysql by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with mysql's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.