Page 40 of 202 results (0.018 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Directory traversal vulnerability in MySQL before 3.23.36 allows local users to modify arbitrary files and gain privileges by creating a database whose name starts with .. (dot dot). • https://www.exploit-db.com/exploits/20718 http://archives.neohapsis.com/archives/bugtraq/2001-03/0237.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0396.html http://www.securityfocus.com/bid/2522 https://exchange.xforce.ibmcloud.com/vulnerabilities/6617 •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

Buffer overflow in MySQL before 3.23.33 allows remote attackers to execute arbitrary code via a long drop database request. • http://dev.mysql.com/doc/mysql/en/news-3-23-33.html http://www.kb.cert.org/vuls/id/367320 http://www.securityfocus.com/archive/1/161917 https://exchange.xforce.ibmcloud.com/vulnerabilities/6419 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in MySQL before 3.23.31 allows attackers to cause a denial of service and possibly gain privileges. • https://www.exploit-db.com/exploits/20581 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000375 http://marc.info/?l=bugtraq&m=98089552030459&w=2 http://www.calderasystems.com/support/security/advisories/CSSA-2001-006.0.txt http://www.debian.org/security/2001/dsa-013 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-014.php3 http://www.mysql.com/documentation/mysql/bychapter/manual_News.html#News-3.23.3 http://www.redhat.com/support/errata/RHSA-2001&# •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking. • http://marc.info/?l=bugtraq&m=98089552030459&w=2 http://www.calderasystems.com/support/security/advisories/CSSA-2001-006.0.txt http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-014.php3 http://www.redhat.com/support/errata/RHSA-2001-003.html •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

MySQL Database Engine uses a weak authentication method which leaks information that could be used by a remote attacker to recover the password. • http://archives.neohapsis.com/archives/bugtraq/2000-10/0318.html http://www.mysql.com/documentation/mysql/commented/manual.php?section=Security https://exchange.xforce.ibmcloud.com/vulnerabilities/5409 •