
CVE-2006-3486
https://notcve.org/view.php?id=CVE-2006-3486
10 Jul 2006 — Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Ma... • http://bugs.mysql.com/bug.php?id=20622 • CWE-189: Numeric Errors •

CVE-2006-3081 – MySQL Server 4/5 - Str_To_Date Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-3081
19 Jun 2006 — mysqld in MySQL 4.1.x before 4.1.18, 5.0.x before 5.0.19, and 5.1.x before 5.1.6 allows remote authorized users to cause a denial of service (crash) via a NULL second argument to the str_to_date function. mysqld en MySQL v4.1.x antes de v4.1.18, v5.0.x antes de v5.0.19, y v5.1.x antes de v5.1.6 permite causar una denegación de servicio (caída del demonio) a usuarios remotos autorizados a través de un segundo argumento nulo para la función STR_TO_DATE. • https://www.exploit-db.com/exploits/28026 •

CVE-2006-2753
https://notcve.org/view.php?id=CVE-2006-2753
01 Jun 2006 — SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=369735 •

CVE-2006-1517
https://notcve.org/view.php?id=CVE-2006-1517
05 May 2006 — sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to obtain sensitive information via a COM_TABLE_DUMP request with an incorrect packet length, which includes portions of memory in an error message. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365939 •

CVE-2006-1518 – MySQL 5.0.20 - COM_TABLE_DUMP Memory Leak/Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-1518
05 May 2006 — Buffer overflow in the open_table function in sql_base.cc in MySQL 5.0.x up to 5.0.20 might allow remote attackers to execute arbitrary code via crafted COM_TABLE_DUMP packets with invalid length values. • https://www.exploit-db.com/exploits/1741 •

CVE-2006-1516 – MySQL 4.1.18/5.0.20 - Local/Remote Information Leakage
https://notcve.org/view.php?id=CVE-2006-1516
05 May 2006 — The check_connection function in sql_parse.cc in MySQL 4.0.x up to 4.0.26, 4.1.x up to 4.1.18, and 5.0.x up to 5.0.20 allows remote attackers to read portions of memory via a username without a trailing null byte, which causes a buffer over-read. • https://www.exploit-db.com/exploits/1742 •

CVE-2006-0903 – MySQL 5.0.18 - Query Logging Bypass
https://notcve.org/view.php?id=CVE-2006-0903
27 Feb 2006 — MySQL 5.0.18 and earlier allows local users to bypass logging mechanisms via SQL queries that contain the NULL character, which are not properly handled by the mysql_real_query function. NOTE: this issue was originally reported for the mysql_query function, but the vendor states that since mysql_query expects a null character, this is not an issue for mysql_query. • https://www.exploit-db.com/exploits/27326 •

CVE-2006-0369
https://notcve.org/view.php?id=CVE-2006-0369
22 Jan 2006 — MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that the availability of the schema is a normal and sometimes desired aspect of database access • http://www.securityfocus.com/archive/1/422491/100/0/threaded • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2005-2572 – HP Security Bulletin HPSBPV02918 2
https://notcve.org/view.php?id=CVE-2005-2572
16 Aug 2005 — MySQL, when running on Windows, allows remote authenticated users with insert privileges on the mysql.func table to cause a denial of service (server hang) and possibly execute arbitrary code via (1) a request for a non-library file, which causes the Windows LoadLibraryEx function to block, or (2) a request for a function in a library that has the XXX_deinit or XXX_init functions defined but is not tailored for mySQL, such as jpeg1x32.dll and jpeg2x32.dll. Potential security vulnerabilities have been identi... • http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c03897409 •

CVE-2005-2558
https://notcve.org/view.php?id=CVE-2005-2558
16 Aug 2005 — Stack-based buffer overflow in the init_syms function in MySQL 4.0 before 4.0.25, 4.1 before 4.1.13, and 5.0 before 5.0.7-beta allows remote authenticated users who can create user-defined functions to execute arbitrary code via a long function_name field. • ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.18.1/SCOSA-2006.18.1.txt •