Page 20 of 147 results (0.018 seconds)

CVSS: 5.0EPSS: 1%CPEs: 46EXPL: 1

The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns. El motor federated en MySQL versiones 5.0.x anteriores a 5.0.51a, versiones 5.1.x anteriores a 5.1.23 y versiones 6.0.x anteriores a 6.0.4, al realizar una determinada consulta SHOW TABLE STATUS, permite a los servidores MySQL remotos causar una denegación de servicio (bloqueo del manejador de federated y bloqueo del demonio) por medio de una respuesta que carece del número mínimo necesario de columnas. • http://bugs.mysql.com/bug.php?id=29801 http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html http://dev.mysql.com/doc/refman/6.0/en/news-6-0-4.html http://lists.mysql.com/announce/502 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html http://osvdb.org/42609 http://secunia.com/advisories/28063 http://secunia.com/advisories/28128 http://secunia. •

CVSS: 7.1EPSS: 4%CPEs: 10EXPL: 1

MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file. MySQL Community Server versiones 5.0.x anteriores a 5.0.51, Enterprise Server versiones 5.0.x anteriores a 5.0.52, Server versiones 5.1.x anteriores a 5.1.23 y Server versiones 6.0.x anteriores a 6.0.4, cuando una tabla se basa en symlinks creados por medio de las opciones explícitas DATA DIRECTORY e INDEX DIRECTORY, permite a los usuarios remotos autenticados sobrescribir la información de la tabla del sistema y alcanzar privilegios por medio de una sentencia RENAME TABLE que cambia el symlink para que apunte hacia un archivo existente. • http://bugs.mysql.com/32111 http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-51.html http://dev.mysql.com/doc/refman/5.0/en/releasenotes-es-5-0-52.html http://forums.mysql.com/read.php?3%2C186931%2C186931 http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html http://lists.mysql.com/announce/495 http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.htm • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.0EPSS: 9%CPEs: 1EXPL: 1

The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. La función convert_search_mode_to_innobase del ha_innodb.cc en el motor InnoDB del 5.1.23-BK y versiones anteriores permite a usuarios remotos autenticados provocar una denegación de servicio (caída de la base de datos) a través de ciertas operaciones CONTAINS sobre un índice de una columna, lo que dispara una afirmación de error. • https://www.exploit-db.com/exploits/30744 http://bugs.gentoo.org/show_bug.cgi?id=198988 http://bugs.mysql.com/bug.php?id=32125 http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/067350.html http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html http://secunia.com/advisories/27568 http://secunia.com/advisories/27649 http://secunia.com/advisories/27823 http://secunia.com/advisories/28025 http://secunia.com/advisories/28040 http://secunia. • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 83%CPEs: 1EXPL: 0

MySQL Community Server before 5.0.45 allows remote attackers to cause a denial of service (daemon crash) via a malformed password packet in the connection protocol. MySQL Community Server anterior a 5.0.45 permite a atacantes remotos provocar una denegación de servicio (caída del demonio) mediante un paquete de contraseña mal formado en el protocolo de control. • http://bugs.mysql.com/bug.php?id=28984 http://dev.mysql.com/doc/refman/4.1/en/news-4-1-24.html http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-45.html http://lists.mysql.com/announce/470 http://osvdb.org/36732 http://secunia.com/advisories/25301 http://secunia.com/advisories/26073 http://secunia.com/advisories/26430 http://secunia.com/advisories/26498 http://secunia.com/advisories/26621 http://secunia.com/advisories/26710 http:/ • CWE-20: Improper Input Validation •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

MySQL Community Server before 5.0.45 does not require privileges such as SELECT for the source table in a CREATE TABLE LIKE statement, which allows remote authenticated users to obtain sensitive information such as the table structure. MySQL Community Server anterior al 5.0.45 no requiere privilegios como el SELECT para la tabla de origen en la sentencia CREATE TABLE LIKE, lo que permite a usuarios remotos autenticados la obtención de información sensible como la estructura de la tabla. • http://bugs.mysql.com/bug.php?id=25578 http://dev.mysql.com/doc/refman/5.0/en/releasenotes-cs-5-0-45.html http://lists.mysql.com/announce/470 http://osvdb.org/37783 http://secunia.com/advisories/25301 http://secunia.com/advisories/26073 http://secunia.com/advisories/26430 http://secunia.com/advisories/26498 http://secunia.com/advisories/26987 http://secunia.com/advisories/28040 http://secunia.com/advisories/28108 http://secunia.com/advisories/28128 http:& •