Unknown
CVE-2010-3676
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
storage/innobase/dict/dict0crea.c in mysqld in Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (assertion failure) by modifying the (1) innodb_file_format or (2) innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Products
- mysql 5.1,
- mysql 5.1.1,
- mysql 5.1.10,
- mysql 5.1.11,
- mysql 5.1.12,
- mysql 5.1.13,
- mysql 5.1.14,
- mysql 5.1.15,
- mysql 5.1.16,
- mysql 5.1.17,
- mysql 5.1.18,
- mysql 5.1.19,
- mysql 5.1.2,
- mysql 5.1.20,
- mysql 5.1.21,
- mysql 5.1.22,
- mysql 5.1.23,
- mysql 5.1.24,
- mysql 5.1.25,
- mysql 5.1.26,
- mysql 5.1.27,
- mysql 5.1.28,
- mysql 5.1.29,
- mysql 5.1.3,
- mysql 5.1.30,
- mysql 5.1.31,
- mysql 5.1.32,
- mysql 5.1.33,
- mysql 5.1.34,
- mysql 5.1.35,
- mysql 5.1.36,
- mysql 5.1.37,
- mysql 5.1.38,
- mysql 5.1.39,
- mysql 5.1.4,
- mysql 5.1.40,
- mysql 5.1.41,
- mysql 5.1.42,
- mysql 5.1.43,
- mysql 5.1.44,
- mysql 5.1.45,
- mysql 5.1.46,
- mysql 5.1.47,
- mysql 5.1.48,
- mysql 5.1.5,
- mysql 5.1.6,
- mysql 5.1.7,
- mysql 5.1.8,
- mysql 5.1.9
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: