Page 64 of 361 results (0.012 seconds)

CVSS: 5.0EPSS: 81%CPEs: 71EXPL: 1

The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read. • https://www.exploit-db.com/exploits/1742 http://bugs.debian.org/365938 http://dev.mysql.com/doc/refman/5.0/en/news-5-0-21.html http://docs.info.apple.com/article.html?artnum=305214 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html http://lists.suse.com/archive/suse-security-announce/2006-Jun/0011.html http://secunia.com/advisories/19929 http://secunia.com/advisories/20002 http://secunia.com/advisories/20073 http://secunia.com/advisories/20 •

CVSS: 4.6EPSS: 0%CPEs: 133EXPL: 1

MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query. • https://www.exploit-db.com/exploits/27326 http://archives.neohapsis.com/archives/fulldisclosure/2006-02/0653.html http://bugs.mysql.com/bug.php?id=17667 http://rst.void.ru/papers/advisory39.txt http://secunia.com/advisories/19034 http://secunia.com/advisories/19502 http://secunia.com/advisories/19814 http://secunia.com/advisories/20241 http://secunia.com/advisories/20253 http://secunia.com/advisories/20333 http://secunia.com/advisories/20625 http://secunia.com/advisories& •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that the availability of the schema is a normal and sometimes desired aspect of database access • http://www.securityfocus.com/archive/1/422491/100/0/threaded http://www.securityfocus.com/archive/1/422592/100/0/threaded http://www.securityfocus.com/archive/1/422698/100/0/threaded http://www.securityfocus.com/archive/1/423180/30/7310/threaded http://www.securityfocus.com/archive/1/423204/100/0/threaded http://www.securityfocus.com/archive/1/423228/100/0/threaded http://www.securityfocus.com/archive/1/423432/100/0/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.5EPSS: 0%CPEs: 1EXPL: 0

MySQL, when running on Windows, allows remote authenticated users with insert privileges on the mysql.func table to cause a denial of service (server hang) and possibly execute arbitrary code via (1) a request for a non-library file, which causes the Windows LoadLibraryEx function to block, or (2) a request for a function in a library that has the XXX_deinit or XXX_init functions defined but is not tailored for mySQL, such as jpeg1x32.dll and jpeg2x32.dll. • http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 http://marc.info/?l=bugtraq&m=112360818900941&w=2 http://secunia.com/advisories/54788 http://www.appsecinc.com/resources/alerts/mysql/2005-003.html http://www.securityfocus.com/bid/62358 http://www.securitytracker.com/id/1029010 https://exchange.xforce.ibmcloud.com/vulnerabilities/21756 •

CVSS: 5.0EPSS: 0%CPEs: 38EXPL: 0

The mysql_create_function function in sql_udf.cc for MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta, when running on Windows, uses an incomplete blacklist in a directory traversal check, which allows attackers to include arbitrary files via the backslash (\) character. • http://lists.grok.org.uk/pipermail/full-disclosure/2005-August/035847.html http://marc.info/?l=bugtraq&m=112360618320729&w=2 http://mysql.bkbits.net:8080/mysql-4.0/cset%40428b981bg2iwh3CbGANDaF-W6DbttA http://mysql.bkbits.net:8080/mysql-4.0/gnupatch%40428b981bg2iwh3CbGANDaF-W6DbttA http://www.appsecinc.com/resources/alerts/mysql/2005-001.html https://exchange.xforce.ibmcloud.com/vulnerabilities/21738 •