A vulnerability in the Connector/J subcomponent of the MySQL Connectors component of Oracle MySQL could allow an unauthenticated, remote attacker to compromise the affected software completely on a targeted system.
The vulnerability is due to improper input validation that is performed by the affected software. An attacker could exploit the vulnerability by submitting malicious input to the affected software. A successful exploit could allow the attacker to compromise the affected software completely.
Oracle confirmed the vulnerability and released software updates.
Security Impact Rating: Medium