Page 40 of 198 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

The mysqlaccess script in MySQL 4.0.23 and earlier, 4.1.x before 4.1.10, 5.0.x before 5.0.3, and other versions including 3.x, allows local users to overwrite arbitrary files or read temporary files via a symlink attack on temporary files. El script mysqlaccess de MySQL 4.0.23 y anteriores, 4.1.x anteriores a 4.1.10, 5.0.x anteriores a 5.0.3, y otras versiones incluyendo 3.x permite a usuarios locales sobreescribir ficheros arbitrariamente o leer ficheros temporales mediante un enlace de enlaces simbólicos (symlink) en ficheros temporales. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000947 http://lists.mysql.com/internals/20600 http://marc.info/?l=bugtraq&m=110608297217224&w=2 http://mysql.osuosl.org/doc/mysql/en/News-4.1.10.html http://secunia.com/advisories/13867 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 http://www.debian.org/security/2005/dsa-647 http://www.mandriva.com/security/advisories?name=MDKSA-2005:036 http://www.securityfocus.com/bid/12277 https:&#x • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 1

Buffer overflow in the prepared statements API in libmysqlclient for MySQL 4.1.3 beta and 4.1.4 allows remote attackers to cause a denial of service via a large number of placeholders. • http://bugs.mysql.com/bug.php?id=5194 http://dev.mysql.com/doc/mysql/en/news-4-1-5.html http://securitytracker.com/id?1011408 http://www.osvdb.org/10244 http://www.securityfocus.com/bid/11261 https://exchange.xforce.ibmcloud.com/vulnerabilities/17493 •

CVSS: 7.5EPSS: 1%CPEs: 5EXPL: 3

MySQL 3.x before 3.23.59, 4.x before 4.0.19, 4.1.x before 4.1.2, and 5.x before 5.0.1, checks the CREATE/INSERT rights of the original table instead of the target table in an ALTER TABLE RENAME operation, which could allow attackers to conduct unauthorized activities. MySQL 4 anteriores a 4.0.21 y 3.x anteriores a 3.23.49 comprueban los derechos CREATE/INSERT de la tabla original en lugar de los de la tabla de destino en una operación ALTER TABLE RANAME, lo que podría permitir a atacantes realizar actividades no permitidas. • https://www.exploit-db.com/exploits/24669 http://bugs.mysql.com/bug.php?id=3270 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000892 http://lists.mysql.com/internals/13073 http://secunia.com/advisories/12783 http://securitytracker.com/id?1011606 http://sunsolve.sun.com/search/document.do?assetkey=1-26-101864-1 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-562 http://www.gentoo.org/security/en/glsa/glsa-200 •