Show filters
81 Total Results
Displaying 71-80 of 81
Sort by:
Attacker Value
Unknown

CVE-2008-0226

Disclosure Date: January 10, 2008 (last updated October 04, 2023)
Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp.
0
Attacker Value
Unknown

CVE-2007-6303

Disclosure Date: December 10, 2007 (last updated October 04, 2023)
MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4 does not update the DEFINER value of a view when the view is altered, which allows remote authenticated users to gain privileges via a sequence of statements including a CREATE SQL SECURITY DEFINER VIEW statement and an ALTER VIEW statement.
0
Attacker Value
Unknown

CVE-2007-6304

Disclosure Date: December 10, 2007 (last updated October 04, 2023)
The federated engine in MySQL 5.0.x before 5.0.51a, 5.1.x before 5.1.23, and 6.0.x before 6.0.4, when performing a certain SHOW TABLE STATUS query, allows remote MySQL servers to cause a denial of service (federated handler crash and daemon crash) via a response that lacks the minimum required number of columns.
0
Attacker Value
Unknown

CVE-2007-5970

Disclosure Date: December 10, 2007 (last updated October 04, 2023)
MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.
0
Attacker Value
Unknown

CVE-2007-5969

Disclosure Date: December 10, 2007 (last updated October 04, 2023)
MySQL Community Server 5.0.x before 5.0.51, Enterprise Server 5.0.x before 5.0.52, Server 5.1.x before 5.1.23, and Server 6.0.x before 6.0.4, when a table relies on symlinks created through explicit DATA DIRECTORY and INDEX DIRECTORY options, allows remote authenticated users to overwrite system table information and gain privileges via a RENAME TABLE statement that changes the symlink to point to an existing file.
0
Attacker Value
Unknown

CVE-2007-2692

Disclosure Date: May 16, 2007 (last updated October 04, 2023)
The mysql_change_db function in MySQL 5.0.x before 5.0.40 and 5.1.x before 5.1.18 does not restore THD::db_access privileges when returning from SQL SECURITY INVOKER stored routines, which allows remote authenticated users to gain privileges.
0
Attacker Value
Unknown

CVE-2007-2693

Disclosure Date: May 16, 2007 (last updated October 04, 2023)
MySQL before 5.1.18 allows remote authenticated users without SELECT privileges to obtain sensitive information from partitioned tables via an ALTER TABLE statement.
0
Attacker Value
Unknown

CVE-2006-4226

Disclosure Date: August 18, 2006 (last updated October 04, 2023)
MySQL before 4.1.21, 5.0 before 5.0.25, and 5.1 before 5.1.12, when run on case-sensitive filesystems, allows remote authenticated users to create or access a database when the database name differs only in case from a database for which they have permissions.
0
Attacker Value
Unknown

CVE-2006-4227

Disclosure Date: August 18, 2006 (last updated October 04, 2023)
MySQL before 5.0.25 and 5.1 before 5.1.12 evaluates arguments of suid routines in the security context of the routine's definer instead of the routine's caller, which allows remote authenticated users to gain privileges through a routine that has been made available using GRANT EXECUTE.
0
Attacker Value
Unknown

CVE-2006-3486

Disclosure Date: July 10, 2006 (last updated November 08, 2023)
Off-by-one buffer overflow in the Instance_options::complete_initialization function in instance_options.cc in the Instance Manager in MySQL before 5.0.23 and 5.1 before 5.1.12 might allow local users to cause a denial of service (application crash) via unspecified vectors, which triggers the overflow when the convert_dirname function is called. NOTE: the vendor has disputed this issue via e-mail to CVE, saying that it is only exploitable when the user has access to the configuration file or the Instance Manager daemon. Due to intended functionality, this level of access would already allow the user to disrupt program operation, so this does not cross security boundaries and is not a vulnerability
0