Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-31026
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Use of Uninitialized Variable in trilogy
Source: NVD (National Vulnerability Database)
Vulnerability Description
Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1.1 This issue can be avoided by only connecting to trusted servers.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对未经初始化资源的使用
Source: NVD (National Vulnerability Database)
Vulnerability Title
Trilogy 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Trilogy是美国GitHub开源的一个用于 MySQL 兼容数据库服务器的客户端库。旨在提高性能、灵活性和易于嵌入性。 Trilogy 2.1.1之前版本存在安全漏洞,该漏洞源于在进行身份验证时,恶意服务器可能会返回特制的身份验证数据包,从而导致客户端从堆栈内存中的未初始化变量中读取并返回最多 12 字节的数据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
githubtrilogy < 2.1.1 -
II. Public POCs for CVE-2022-31026
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-31026
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-31026

No comments yet


Leave a comment