Page 52 of 282 results (0.006 seconds)

CVSS: 10.0EPSS: 89%CPEs: 1EXPL: 1

The check_scramble_323 function in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to bypass authentication via a zero-length scrambled string. La función check_scramble_323 de MySQL 4.1x anteriores a 4.1.4, y 5.0, permite a atacantes remotos saltarse la autenticación mediente una cadena revuelta de longitud cero. • https://www.exploit-db.com/exploits/311 http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html http://marc.info/?l=bugtraq&m=108904917528205&w=2 http://www.kb.cert.org/vuls/id/184030 •

CVSS: 10.0EPSS: 4%CPEs: 1EXPL: 0

Stack-based buffer overflow in MySQL 4.1.x before 4.1.3, and 5.0, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long scramble string. Desbordamiento basado en la pila en MySQL 4.1.x anteriores a 4.1.3, y 5.0 permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección mediante una cadena de permutación (scramble). • http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0001.html http://marc.info/?l=bugtraq&m=108904917528205&w=2 http://www.kb.cert.org/vuls/id/645326 https://exchange.xforce.ibmcloud.com/vulnerabilities/16612 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The mysqld_multi script in MySQL allows local users to overwrite arbitrary files via a symlink attack. • http://dev.mysql.com/doc/mysql/en/news-4-1-2.html http://marc.info/?l=bugtraq&m=108206802810402&w=2 http://secunia.com/advisories/11223 http://security.gentoo.org/glsa/glsa-200405-20.xml http://securitytracker.com/id?1009784 http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-483 http://www.mandriva.com/security/advisories?name=MDKSA-2004:034 http://www.osvdb.org/6421 http://www.redhat.com/support/errata/RHSA-2004-5 •

CVSS: 2.1EPSS: 0%CPEs: 75EXPL: 0

mysqlbug in MySQL allows local users to overwrite arbitrary files via a symlink attack on the failed-mysql-bugreport temporary file. mysqlbug de MySQL pemite a usuarios locales sobreescribir ficheros elgidos arbitrariamente mediante un ataque de enlaces simbólicos sobre el fichero temporal failed-mysql-bugreport • http://marc.info/?l=bugtraq&m=108023246916294&w=2 http://marc.info/?l=bugtraq&m=108206802810402&w=2 http://security.gentoo.org/glsa/glsa-200405-20.xml http://www.ciac.org/ciac/bulletins/p-018.shtml http://www.debian.org/security/2004/dsa-483 http://www.mandriva.com/security/advisories?name=MDKSA-2004:034 http://www.redhat.com/support/errata/RHSA-2004-569.html http://www.redhat.com/support/errata/RHSA-2004-597.html http://www.securityfocus.com/bid/9976 https& •

CVSS: 4.0EPSS: 0%CPEs: 1EXPL: 1

Stack-based buffer overflow in the mysql_real_connect function in the MySql client library (libmysqlclient) 4.0.13 and earlier allows local users to execute arbitrary code via a long socket name, a different vulnerability than CVE-2001-1453. • http://archives.neohapsis.com/archives/fulldisclosure/2003-q2/1303.html http://bugs.mysql.com/bug.php?id=564 http://www.securityfocus.com/bid/7887 https://exchange.xforce.ibmcloud.com/vulnerabilities/12337 •