The host is installed with Oracle MySQL Server through 5.7.30 or 8.0.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Pluggable Auth. Successful exploitation allows attackers to affect Integrity.