Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: XML). Supported versions that are affected are 5.6.44 and prior, 5.7.26 and prior and 8.0.16 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
{
"unresolved_ranges": [
{
"vendor_product": "canonical:ubuntu_linux",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "16.04"
},
{
"last_affected": "18.04"
},
{
"last_affected": "19.04"
}
]
},
{
"vendor_product": "fedoraproject:fedora",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "29"
},
{
"last_affected": "30"
}
]
},
{
"vendor_product": "opensuse:leap",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "15.1"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_desktop",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_eus",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.1"
},
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_server",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_server_aus",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_server_tus",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.6:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.2"
},
{
"last_affected": "8.4"
},
{
"last_affected": "8.6"
}
]
},
{
"vendor_product": "redhat:enterprise_linux_workstation",
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:8.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "8.0"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "5.5.0"
},
{
"fixed": "5.5.65"
},
{
"introduced": "10.1.0"
},
{
"fixed": "10.1.41"
},
{
"introduced": "10.2.0"
},
{
"fixed": "10.2.26"
},
{
"introduced": "10.3.0"
},
{
"fixed": "10.3.17"
},
{
"introduced": "10.4.0"
},
{
"fixed": "10.4.7"
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-2740.json"
"2026-05-18T17:38:41Z"
[
{
"signature_type": "Line",
"source": "https://github.com/mariadb/server/commit/cc37250a76472de4021bdfb395a17a9e736aecf6",
"target": {
"file": "sql-common/client_plugin.c"
},
"digest": {
"line_hashes": [
"10029655468523680087909754560677550487",
"249206229017255372790869811829915538710",
"135594948238048789926237750215822573110",
"294639499642123912567807309333166069529"
],
"threshold": 0.9
},
"deprecated": false,
"id": "CVE-2019-2740-b48fe36d",
"signature_version": "v1"
},
{
"signature_type": "Function",
"source": "https://github.com/mariadb/server/commit/cc37250a76472de4021bdfb395a17a9e736aecf6",
"target": {
"function": "mysql_load_plugin_v",
"file": "sql-common/client_plugin.c"
},
"digest": {
"function_hash": "328702508623507382370033351725735174012",
"length": 1863.0
},
"deprecated": false,
"id": "CVE-2019-2740-e9448928",
"signature_version": "v1"
}
]
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "5.6.0"
},
{
"last_affected": "5.6.44"
},
{
"introduced": "5.7.0"
},
{
"last_affected": "5.7.26"
},
{
"introduced": "8.0.0"
},
{
"last_affected": "8.0.16"
}
]
}