Page 38 of 203 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 133EXPL: 1

MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query. • https://www.exploit-db.com/exploits/27326 http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html http://bugs.mysql.com/bug.php?id=17667 http://rst.void.ru/papers/advisory39.txt http://secunia.com/advisories/19034 http://secunia.com/advisories/19502 http://secunia.com/advisories/19814 http://secunia.com/advisories/20241 http://secunia.com/advisories/20253 http://secunia.com/advisories/20333 http://secunia.com/advisories/20625 http://secunia.com/advisories& •

CVSS: 5.0EPSS: 0%CPEs: 38EXPL: 0

The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html http://marc.info/?l=bugtraq&m=112360618320729&w=2 http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA http://www.appsecinc.com/resources/alerts/mysql/2005-001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/21738 •

CVSS: 4.6EPSS: 95%CPEs: 38EXPL: 0

Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035845.html http://marc.info/?l=bugtraq&m=112354450412427&w=2 http://secunia.com/advisories/17027 http://secunia.com/advisories/20381 http://secunia.com/advisories/29847 http://sunsolve.sun.com/search/document.do?assetkey=1-26-236703-1 http://www.appsecinc.com/resources/alerts/mysql/2005-002.html http://www.debian.org/security/ •

CVSS: 4.6EPSS: 0%CPEs: 22EXPL: 0

mysql_install_db in MySQL 4.1.x before 4.1.12 and 5.x up to 5.0.4 creates the mysql_install_db.X file with a predictable filename and insecure permissions, which allows local users to execute arbitrary SQL commands by modifying the file's contents. • http://marc.info/?l=full-disclosure&m=111632686805498&w=2 http://secunia.com/advisories/15369 http://secunia.com/advisories/17080 http://www.mandriva.com/security/advisories?name=MDKSA-2006:045 http://www.redhat.com/support/errata/RHSA-2005-685.html http://www.securityfocus.com/bid/13660 http://www.zataz.net/adviso/mysql-05172005.txt https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=158688 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3 •

CVSS: 4.6EPSS: 96%CPEs: 34EXPL: 3

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, allows remote authenticated users with INSERT and DELETE privileges to execute arbitrary code by using CREATE FUNCTION to access libc calls, as demonstrated by using strcat, on_exit, and exit. • https://www.exploit-db.com/exploits/25209 http://archives.neohapsis.com/archives/vulnwatch/2005-q1/0084.html http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html http://marc.info/?l=bugtraq&m=111066115808506&w=2 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 http://www.debian.org/security/2005/dsa-707 http://www.gentoo.org/security/en/glsa/glsa-200503-19.xml • CWE-94: Improper Control of Generation of Code ('Code Injection') •