Page 40 of 221 results (0.013 seconds)

CVSS: 3.5EPSS: 1%CPEs: 9EXPL: 4

MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA DIRECTORY NAME command, which causes MySQL to move certain directories to the server data directory. MySQL anterior a v5.1.48 permite a usuarios autenticados remotamente con privilegios de modificación en la base de datos provocar una denegación de servicio (caída de servidor y pérdida de la base de datos) a través del comando "ALTER DATABASE" con una cadena #mysql50# seguida de un ..(punto punto), ../ (punto punto barra) o secuencia similar, y un comando "UPGRADE DATA DIRECTORY NAME", lo que provoca que MySQL mueva ciertos directorios al directorio del servidor de datos. • https://www.exploit-db.com/exploits/14537 http://bugs.mysql.com/bug.php?id=53804 http://dev.mysql.com/doc/refman/5.1/en/news-5-1-48.html http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044546.html http://secunia.com/advisories/40333 http://secunia.com/advisories/40762 http://www.mandriva.com/security/advisories?name=MDVSA-2010:155 http://www.securityfocus.com/bid/41198 http://www.securitytracker.com/id?1024160 http://www.ubuntu.com/usn/USN-1 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 85EXPL: 0

Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name. Vulnerabilidad de salto de directorio en MySQL v5.0 hasta v5.0.91 y v5.1 anteriores a v5.1.47 permite a usuarios autenticados remotamente saltarse tablas establecidas permitiendo leer definiciones de campos de tablas de su elección, y sobre v5.1 leer o eliminar contenido de tablas de su elección, a través de .. (punto punto) en un nombre de tabla. • http://bugs.mysql.com/bug.php?id=53371 http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.mysql.com/commits/107532 http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html http://securitytracker.com/id?1024031 http:/ • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 4%CPEs: 85EXPL: 0

The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length. La función my_net_skip_rest en sql/net_serv.cc en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite a atacantes remotos provocar una denegación de servicio (mediante excesivo consumo de CPU y ancho de banda) mediante el envío de una gran cantidad de paquetes que exceden la longitud máxima. • http://bugs.mysql.com/bug.php?id=50974 http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.mysql.com/commits/106060 http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html http://securitytracker.com/id?1024032 http:/ •

CVSS: 6.0EPSS: 93%CPEs: 85EXPL: 0

Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name. Un desbordamiento de búfer en MySQL v5.0 a v5.0.91 y v5.1 antes de v5.1.47 permite ejecutar código de su elección a usuarios remotos autenticados mediante un comando COM_FIELD_LIST con un nombre de tabla larga. • http://bugs.mysql.com/bug.php?id=53237 http://dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html http://dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://securitytracker.com/id?1024033 http://support.apple.com/kb/HT4435 http://www.mandriva.com/security/advisories?name=MDVSA-2010:107 http://www.redhat • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 3.6EPSS: 0%CPEs: 50EXPL: 0

MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247. MySQL en versiones anteriores a la v5.1.46 permite a los usuarios locales borrar los datos e índices de ficheros de tablas MyISAM de otros usuarios a través de un ataque de enlace simbólico junto con un comando DROP TABLE, una vulnerabilidad diferente a la CVE-2008-4098 y CVE-2008-7247. • http://bugs.mysql.com/bug.php?id=40980 http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html http://securitytracker.com/id?1024004 http://www.mandriva.com/security/advisories?name=MDVSA-2010:101 http://www.openwall.com/lists/oss-security/2010/05/10/2 http://www.openwall.com/lists/oss-security/2010/05/18/4 http://www.redhat.com/support/errata/RHSA-2010-0442.html http://www • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-264: Permissions, Privileges, and Access Controls •