Page 39 of 214 results (0.004 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

The mysqlhotcopy script in mysql 4.0.20 and earlier, when using the scp method from the mysql-server package, allows local users to overwrite arbitrary files via a symlink attack on temporary files. El script mysqlhotcopy de mysql 4.0.20 y anteriores, cuando se usa el método scp del paquete mysql-server, permite a usuarios locales sobreescribir ficheros de su elección mediante un ataque de enlaces simbólicos en ficheros temporales. • http://packages.debian.org/changelogs/pool/main/m/mysql-dfsg/mysql-dfsg_4.0.20-11/changelog http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-540 http://www.redhat.com/support/errata/RHSA-2004-597.html https://exchange.xforce.ibmcloud.com/vulnerabilities/17030 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10693 https://access.redhat.com/security/cve/CVE-2004-0457 https://bugzilla.redhat.com/show_bug&# •

CVSS: 2.1EPSS: 0%CPEs: 75EXPL: 0

mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file. mysqlbug de MySQL pemite a usuarios locales sobreescribir ficheros elgidos arbitrariamente mediante un ataque de enlaces simbólicos sobre el fichero temporal failed-mysql-bugreport • http://marc.info/?l=bugtraq&m=108023246916294&w=2 http://marc.info/?l=bugtraq&m=108206802810402&w=2 http://security.gentoo.org/glsa/glsa-200405-20.xml http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-483 http://www.mandriva.com/security/advisories?name=MDKSA-2004:034 http://www.redhat.com/support/errata/RHSA-2004-569.html http://www.redhat.com/support/errata/RHSA-2004-597.html http://www.securityfocus.com/bid/9976 https& •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

Stack-based buffer overflow in the mysql_real_connect function in the MySql client library (libmysqlclient) 4.0.13 and earlier allows local users to execute arbitrary code via a long socket name, a different vulnerability than CVE-2001-1453. • http://archives.neohapsis.com/archives/fulldisclosure/2003-q2/1303.html http://bugs.mysql.com/bug.php?id=564 http://www.securityfocus.com/bid/7887 https://exchange.xforce.ibmcloud.com/vulnerabilities/12337 •

CVSS: 4.3EPSS: 0%CPEs: 66EXPL: 3

MySQL 3.20 through 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for attackers to decrypt the password via brute force methods. • https://www.exploit-db.com/exploits/22565 http://secunia.com/advisories/8753 http://www.securiteam.com/tools/5WP031FA0U.html http://www.securityfocus.com/bid/7500 • CWE-310: Cryptographic Issues •

CVSS: 9.0EPSS: 91%CPEs: 70EXPL: 3

Buffer overflow in get_salt_from_password from sql_acl.cc for MySQL 4.0.14 and earlier, and 3.23.x, allows attackers with ALTER TABLE privileges to execute arbitrary code via a long Password field. Desbordamiento de búfer en get_salt_from_password de sql_acl.cc de MySQL 4.0.14 y anteriores, y 3.23.x, permite a atacantes ejecutar código arbitrario mediante un campo de contraseña largo. • https://www.exploit-db.com/exploits/23138 https://www.exploit-db.com/exploits/98 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000743 http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009819.html http://marc.info/?l=bugtraq&m=106364207129993&w=2 http://marc.info/?l=bugtraq&m=106381424420775&w=2 http://secunia.com/advisories/9709 http://www.debian.org/security/2003/dsa-381 http://www.kb.cert.org/vuls/id/516492 http://www.mandriva •