Page 44 of 228 results (0.006 seconds)

CVSS: 7.5EPSS: 2%CPEs: 62EXPL: 2

The COM_CHANGE_USER command in MySQL 3.x before 3.23.54, and 4.x before 4.0.6, allows remote attackers to gain privileges via a brute force attack using a one-character password, which causes MySQL to only compare the provided password against the first character of the real password. El comando COM_CHANGE_USER en MySQL 3.x anterirores de 3.23.54 y 4.x anteriores a 4.0.5 permite a atacantes remotos ganar privilegios mediante un ataque de fuerza bruta usando una contraseña de un carácter, lo que hace que MySQL compare la contraseña suministrada sólo con el primer carácter de la contraseña real. • https://www.exploit-db.com/exploits/22084 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555 http://marc.info/?l=bugtraq&m=103971644013961&w=2 http://marc.info/?l=bugtraq&m=104004857201968&w=2 http://marc.info/?l=bugtraq&m=104005886114500&w=2 http://security.e-matters.de/advisories/042002.html http://www.debian.org/security/2002/dsa-212 http://www.linuxsecurity.com/advisories/engarde_advisory-2660.html http://www.mandrakesoft.com/security/advisories? •

CVSS: 7.5EPSS: 1%CPEs: 62EXPL: 0

libmysqlclient client library in MySQL 3.x to 3.23.54, and 4.x to 4.0.6, does not properly verify length fields for certain responses in the (1) read_rows or (2) read_one_row routines, which allows remote attackers to cause a denial of service and possibly execute arbitrary code. La librería de cliente libmysqlclient en MySQL 3.x a 3.23.54 y 4.x a 4.06, no verifica adecuadamente longitudes de campos de ciertas respuestas en las rutinas read_rows o read_one_row, lo que permite a a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000555 http://marc.info/?l=bugtraq&m=103971644013961&w=2 http://marc.info/?l=bugtraq&m=104004857201968&w=2 http://marc.info/?l=bugtraq&m=104005886114500&w=2 http://marc.info/? •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

Buffer overflow in MySQL daemon (mysqld) before 3.23.50, and 4.0 beta before 4.02, on the Win32 platform, allows local users to execute arbitrary code via a long "datadir" parameter in the my.ini initialization file, whose permissions on Windows allow Full Control to the Everyone group. Desbordamiento de búfer en MySQL anteriores a 3.23.50, y 4.0 beta anteriores a 4.02 sobre Windows, y posiblemente otras plataformas, permite a usuarios locales ejecutar código arbitrario mediante un parámetro datadir largo en el fichero de inicialización my.ini, cuyos permisos en Windows permiten Control Total al grupo Todos. • http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0004.html http://marc.info/?l=bugtraq&m=103358628011935&w=2 http://www.iss.net/security_center/static/10243.php http://www.mysql.com/documentation/mysql/bychapter/manual_News.html#News-3.23.x http://www.securityfocus.com/bid/5853 http://www.westpoint.ltd.uk/advisories/wp-02-0003.txt • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

WinMySQLadmin 1.1 stores the MySQL password in plain text in the my.ini file, which allows local users to obtain unathorized access the MySQL database. • http://online.securityfocus.com/archive/1/217848 http://www.iss.net/security_center/static/7206.php http://www.securityfocus.com/bid/3381 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Directory traversal vulnerability in MySQL before 3.23.36 allows local users to modify arbitrary files and gain privileges by creating a database whose name starts with .. (dot dot). • https://www.exploit-db.com/exploits/20718 http://archives.neohapsis.com/archives/bugtraq/2001-03/0237.html http://archives.neohapsis.com/archives/bugtraq/2001-03/0396.html http://www.securityfocus.com/bid/2522 https://exchange.xforce.ibmcloud.com/vulnerabilities/6617 •