Mysql-connector-python

Latest version: v9.2.0

Safety actively analyzes 710445 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 6

8.0.33

Not secure
=======

- WL15528: Add docker build/test support for existing server
- WL15483: Support OCI ephemeral key-based authentication
- WL15435: Improve the logging system
- WL15401: Support for type hints in module mysqlx
- BUG35233031: Connector/Python should not default to mysql_native_password
- BUG35015758: COM_QUIT should not be called in the connection phase
- BUG34984850: Fix binary conversion with NO_BACKSLASH_ESCAPES mode
- BUG31355895: Fix slow executemany() with insert statements
- BUG30103652: Connector/Python ClientFlag SESION_TRACK is a misspelling
- BUG27489972: Several COM_% commands have been deprecated
- BUG27359063: Support for dictionary, named_tuple, and raw to prepared statements cursor
- BUG21476351: Too small chunks when sending huge parameters with COM_STMT_SEND_LONG_DATA

8.0.32

Not secure
=======

- WL15348: Support MIT Kerberos library on Windows
- WL15036: Support for type hints
- WL14861: Remove distutils support
- BUG34773422: Connector/Python 8.0.31 installation fails if Python version is 3.11.0
- BUG34727432: Fix Django datetime error when USE_TZ=True in settings
- BUG34710366: Django implementation does not pass unit tests
- BUG34695103: Remove debug messages that shows authentication data
- BUG34690501: Connector/Python depends on outdated protobuf
- BUG34689812: Fix datetime conversion when using prepared cursors
- BUG34675508: Character set 'utf8' unsupported in python mysql connector when using MariaDB
- BUG34655520: Wrong MySQLCursor.statement values in the results of cursor.execute(..., multi=True)
- BUG34556157: Kerberos authorization fails when using SSPI as security interface
- BUG34499578: MySQLCursor.executemany() fails to correctly identify BULK data loading ops
- BUG34467201: Add init_command connection option
- BUG33904362: mysqlx (X DevAPI) does not work properly with Russian characters
- BUG32625155: Tests fail against group replication cluster
- BUG30089671: Fix decoding VARBINARY columns when using a prepared cursor
- BUG28020811: Fix multiple reference leaks in the C extension
- BUG27426532: Reduce callproc roundtrip time
- BUG24364556: Improve warning behavior
- BUG23342572: Allow dictionaries as parameters in prepared statements
- BUG23339387: Add MySQLCursorPreparedDict option
- BUG22906307: MySQLConverter.escape() does not work for dates
- BUG20504804: cursor.executemany() fails with INSERT IGNORE

8.0.31

Not secure
=======

- WL15156: Add support for Python 3.11
- BUG34373612: Fix the assumption that gcc is the default compiler
- BUG34283402: Binary data starting with 0x00 are returned as empty string
- BUG34217492: Exec of stored procedures with args fails when db prefix used
- BUG33987119: TEXT and with a _bin collation (e.g: utf8mb4_bin) are considered as bytes object
- BUG28491115: Connector/Python crashes on 0 time value
- BUG28295478: Align exception types raised by pure Python and c-ext
- BUG27634910: Add warning count method to cursors
- BUG21529893: Resultset handling not proper in C-Python with c-ext
- BUG21463298: Fix weakly-referenced object no longer exists exception
- BUG21402805: Unbound local error when charset name is given as empty to set_charset_collation()

8.0.30

Not secure
=======

- WL15212: Update collation mappings
- WL15151: Increase to 88 characters per line
- WL15137: Fix linting issues
- WL15035: Enforce PEP 7 and PEP 8 coding style
- WL14822: Refactor the authentication plugin mechanism
- WL14815: Support OpenSSL 3.0
- BUG34260344: Disallow empty strings in collection fields
- BUG34231226: Generated classes do not work with the latest Protobuf
- BUG34228442: Fix NO_BACKSLASH_ESCAPES SQL mode support in c-ext
- BUG34223015: Invalidate the usage of non-compatible cursor types
- BUG34127959: Add isolation level support in Django backend
- BUG33923516: Allow tuple of dictionaries as "failover" argument
- BUG28821983: Fix rounding errors for decimal values
- BUG28295504: Disable SSL when using Unix socket connections

8.0.29

Not secure
=======

- WL14860: Support FIDO authentication (c-ext)
- WL14852: Align TLS option checking across connectors
- WL14824: Remove Python 3.6 support
- WL14679: Allow custom class for data type conversion in Django backend
- WL14665: SSPI Kerberos authentication for Windows (pure-python)
- BUG33861549: Replace SHOW VARIABLES inefficient statements
- BUG33747585: Fix error when using an expression as a column without an alias
- BUG33729842: Character set 'utf8mb3' support
- BUG33481203: OverflowError for MySQL BIGINT on c-ext
- BUG33203161: Exception is thrown on close connection with pooling
- BUG30203754: Prepared stmt fails on cext with BIGINTS
- BUG28877987: Return bytes or bytearray if decoding fails
- BUG27634914: Remove mention of unsupported functionality in Session docstring
- BUG23338623: Add support for Decimal parsing in protocol.py
- BUG23324748: Guarantee file closing of input files in optionfile
- BUG21528553: Fix API inconsistency when using consume_results=True
- BUG21498719: Fix conversion of Python bytearray (c-ext)
- BUG20065830: NaN is not supported

8.0.28

Not secure
=======

- WL14814: Remove support for TLS 1.0 and 1.1
- WL14813: Add support for Python 3.10
- WL14720: Support for Multi Factor authentication (pure Python)
- WL14667: Support for Multi Factor authentication (c-ext)
- BUG33486094: Stored value in Decimal field is returned as str on prepared pure python cursor
- BUG33410592: Fix compiler warnings
- BUG33409819: Fix failure when using a conversion class in CMySQLConnection
- BUG27358941: Invalid types for params silently ignored in execute method

Page 2 of 6

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.