Page 19 of 195 results (0.006 seconds)

CVSS: 6.5EPSS: 3%CPEs: 7EXPL: 3

09 May 2007 — The in_decimal::set function in item_cmpfunc.cc in MySQL before 5.0.40, and 5.1 before 5.1.18-beta, allows context-dependent attackers to cause a denial of service (crash) via a crafted IF clause that results in a divide-by-zero error and a NULL pointer dereference. La función in_decimal::set en el archivo item_cmpfunc.cc en mySQL versiones anteriores a 5.0.40, y versiones 5.1 anteriores a 5.1.18-beta, permite a atacantes dependiendo del contexto causar una denegación de servicio (bloqueo) por medio de una ... • https://packetstorm.news/files/id/124295 •

CVSS: 5.5EPSS: 0%CPEs: 18EXPL: 3

12 Mar 2007 — MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function. MySQL versión 5.x anterior a 5.0.36, permite a los usuarios locales causar una denegación de servicio (bloqueo de base de datos) al realizar subselecciones de la tabla information_schema y utilizar ORDE... • https://www.exploit-db.com/exploits/29724 • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 0%CPEs: 95EXPL: 3

18 Aug 2006 — MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions. MySQL anteriores a 4.1.21, 5.0 anterior a 5.0.25, y 5.1 anteriores a 5.1.12, cuando se ejecutan en sistemas de fichero sensibles al uso de mayúsculas o minúscular, permite a usuarios autenticados remotamente crear o acceder a una base de datos cuando ... • http://bugs.mysql.com/bug.php?id=17647 •

CVSS: 9.1EPSS: 0%CPEs: 151EXPL: 1

09 Aug 2006 — MySQL 4.1 before 4.1.21 and 5.0 before 5.0.24 allows a local user to access a table through a previously created MERGE table, even after the user's privileges are revoked for the original table, which might violate intended security policy. MySQL 4.1 anterior a 4.1.21 y 5.0 anterior a 5.0.24 permite a usuarios locales acceder a una tabla a través de una tabla MERGE previamente creada, incluso después de que los privilegios del usuario han sido revocados para la tabla original, lo cual podría violar la polít... • http://bugs.mysql.com/bug.php?id=15195 •

CVSS: 6.5EPSS: 51%CPEs: 25EXPL: 1

18 Jul 2006 — Format string vulnerability in time.cc in MySQL Server 4.1 before 4.1.21 and 5.0 before 1 April 2006 allows remote authenticated users to cause a denial of service (crash) via a format string instead of a date as the first parameter to the date_format function, which is later used in a formatted print call to display the error message. Vulnerabilidad de cadena de formato en time.cc de MySQL Server 4.1 anterior a 4.1.21 y 5.0 anterior al 1 de abril de 2006 permite a usuarios autenticados remotamente provocar... • https://www.exploit-db.com/exploits/28234 • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 8%CPEs: 14EXPL: 2

19 Jun 2006 — mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function. mysqld en MySQL v4.1.x antes de v4.1.18, v5.0.x antes de v5.0.19, y v5.1.x antes de v5.1.6 permite causar una denegación de servicio (caída del demonio) a usuarios remotos autorizados a través de un segundo argumento nulo para la función STR_TO_DATE. Mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19... • https://www.exploit-db.com/exploits/28026 •

CVSS: 9.8EPSS: 7%CPEs: 42EXPL: 0

01 Jun 2006 — SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input. An SQL injection vulnerability has been discovered when using less popular multibyte encodings (such as SJIS, or BIG5) which contain valid multibyte characters that end with the byte 0x5c... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735 •

CVSS: 7.5EPSS: 9%CPEs: 71EXPL: 0

05 May 2006 — sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message. Stefano Di Paola discovered an information leak in the login packet parser. By sending a specially crafted malformed login packet, a remote attacker could exploit this to read a random piece of memory, which could potentially reveal sensitive data. Stefa... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 •

CVSS: 9.1EPSS: 81%CPEs: 71EXPL: 1

05 May 2006 — The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read. Stefano Di Paola discovered an information leak in the login packet parser. By sending a specially crafted malformed login packet, a remote attacker could exploit this to read a random piece of memory, which could potentially reveal sensitive data. Stefano Di Paola... • https://www.exploit-db.com/exploits/1742 •

CVSS: 9.1EPSS: 0%CPEs: 133EXPL: 1

27 Feb 2006 — MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query. Several vulnerabilities have been discovered in MySQL, a popular SQL database. • https://www.exploit-db.com/exploits/27326 •