Page 2 of 132 results (0.001 seconds)

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. En la función MMM::Agent::Helpers::Network::add_ip en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (para ... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. MySQL Multi-Master Replication Manager CVE-2017-14476 En la función MMM::Agent::Helpers::Network::add_ip en MySQL Multi-... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::add_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. En la función MMM::Agent::Helpers::Network::add_ip en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (par... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Linux), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. En la función MMM::Agent::Helpers::Network::clear_ip en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (p... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. En la función MMM::Agent::Helpers::Network::clear_ip en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 ... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::clear_ip function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for FreeBSD), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. En la función MMM::Agent::Helpers::Network::clear_ip en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 ... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 10.0EPSS: 2%CPEs: 1EXPL: 1

09 May 2018 — In the MMM::Agent::Helpers::Network::send_arp function in MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 (for Solaris), a specially crafted MMM protocol message can cause a shell command injection resulting in arbitrary command execution with the privileges of the mmm\_agentd process. An attacker that can initiate a TCP session with mmm\_agentd can trigger this vulnerability. En la función MMM::Agent::Helpers::Network::send_arp en MySQL Multi-Master Replication Manager (MMM) mmm_agentd 2.2.1 ... • https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0501 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 5%CPEs: 1EXPL: 3

04 May 2018 — CSP MySQL User Manager 2.3.1 allows SQL injection, and resultant Authentication Bypass, via a crafted username during a login attempt. CSP MySQL User Manager 2.3.1 permite la inyección SQL y una omisión de autenticación resultante mediante un nombre de usuario manipulado durante un intento de inicio de sesión. CSP MySQL User Manager version 2.3.1 suffers from a remote SQL injection vulnerability that allows for authentication bypass. • https://packetstorm.news/files/id/147501 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

27 Oct 2017 — The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link. Los scripts de instalación en los paquetes dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster y dev-db/mariadb-galera de Gento en versiones anteriores a 2017-09... • https://bugs.gentoo.org/630822 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 4.9EPSS: 1%CPEs: 3EXPL: 0

05 Aug 2017 — If, after successful installation of MantisBT through 2.5.2 on MySQL/MariaDB, the administrator does not remove the 'admin' directory (as recommended in the "Post-installation and upgrade tasks" section of the MantisBT Admin Guide), and the MySQL client has a local_infile setting enabled (in php.ini mysqli.allow_local_infile, or the MySQL client config file, depending on the PHP setup), an attacker may take advantage of MySQL's "connect file read" feature to remotely access files on the MantisBT server. Si ... • http://openwall.com/lists/oss-security/2017/08/04/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •