«
Expand/Collapse
330 items tagged "mysql"
Related tags:
user [+],
mysql database server [+],
exploit [+],
red [+],
exploits [+],
com [+],
vulnerabilities [+],
stack [+],
service [+],
security notice [+],
security fixes [+],
multiple [+],
incompatible changes [+],
heap [+],
bugtraq [+],
lts [+],
handler [+],
full disclosure [+],
explain [+],
escalation [+],
attacker [+],
denial of service [+],
whitepaper [+],
usn [+],
statement [+],
privilege [+],
null arguments [+],
mdvsa [+],
mandriva linux [+],
malformed [+],
data directory [+],
buffer overflow vulnerability [+],
authentication [+],
advisory [+],
root [+],
rollup [+],
read [+],
privilege escalation vulnerability [+],
poc [+],
microsoft windows [+],
microsoft [+],
local security [+],
injection [+],
hacking [+],
database [+],
code execution [+],
alter database [+],
access [+],
server [+],
mysql server [+],
service vulnerability [+],
yinjector [+],
windows system [+],
udf user [+],
txt [+],
target system [+],
target machine [+],
target host [+],
system shell [+],
storage engine [+],
squid [+],
sflow [+],
scrutinizer [+],
remote exploit [+],
proxy support [+],
proof of concept [+],
privilege elevation [+],
penetration [+],
pdf [+],
overrun [+],
mysql windows [+],
mysql version [+],
mysql load data [+],
mof [+],
mariadb [+],
load data infile [+],
load [+],
insertion [+],
innodb [+],
exploitation methods [+],
eventum [+],
elevation [+],
default [+],
ddl statement [+],
ddl [+],
darknet [+],
daemon [+],
brute [+],
based buffer overflow [+],
arbitrary code execution [+],
admin user [+],
access report [+],
zeroday [+],
tool [+],
sql injection [+],
security vulnerabilities [+],
read next [+],
password [+],
multiple threads [+],
make [+],
login attempts [+],
linux security [+],
linux database [+],
hat [+],
faster [+],
exploitation [+],
brute force tool [+],
blind [+],
advanced [+],
vulnerability [+],
security vulnerability [+],
remote [+],
cve [+],
remote security [+],
weakness [+],
version [+],
unspecified [+],
takeover [+],
table [+],
symbolic link [+],
sql pdf [+],
sql [+],
shell [+],
server username [+],
server side applications [+],
server server [+],
server mysql [+],
search mode [+],
scanner [+],
retired [+],
remote file include vulnerability [+],
pywebdav [+],
python script [+],
phpgraphy [+],
passwords [+],
occurence [+],
new [+],
mysqlpasswordauditor [+],
mysql password [+],
mysql login [+],
mysql linux [+],
myisam [+],
modified version [+],
mod [+],
malware [+],
login [+],
local privilege escalation [+],
linux stack [+],
information disclosure vulnerability [+],
hijacking [+],
hacked [+],
hack [+],
google [+],
glsa [+],
gains [+],
forcer [+],
doing the rounds [+],
dll [+],
credentials [+],
command line interface [+],
cleanup [+],
character encoding [+],
change [+],
brute forcer [+],
breach [+],
bacula [+],
backdoor [+],
auth [+],
auditing software [+],
allegedly [+],
acl [+],
server vulnerability [+],
server daemon [+],
red hat security [+],
oracle [+],
windows [+],
ubuntu [+],
security [+],
linux [+],
denial [+],
yassl,
yahoo,
video,
uninstall,
tcp,
stack overflow,
stack frame,
stack buffer,
ssl certificate,
ssl,
slides,
services menu,
server certificate,
rpsa,
problem,
privileges,
portuguese,
port,
plugin,
php,
perl,
parse,
paper,
own computer,
overwrite,
openssl,
mysqld,
mysql socket,
mysql server through socket,
mysql drop,
mysql command line,
mydumper,
music,
mensa,
lookup,
logging database,
local mysql server through socket,
injection bug,
init script,
implementation,
html option,
html,
house,
hk music,
format string,
flex,
dumper,
drop,
directory,
db connection,
create,
crackbot,
computer,
command line client,
command,
bug,
buffer overflow,
bench,
base web,
base,
audio,
admin,
accessible network,
Pentesting,
Newbie,
BackTrack,
Area
-
-
16:00
»
SecuriTeam
Oracle MySQL Server is prone to a username-enumeration weakness because it responds differently to login attempts, depending on whether or not the username exists.
-
-
16:00
»
SecuriTeam
MySQL (Linux) Database suffers from Privilege Elevation Zeroday Exploit .
-
-
16:00
»
SecuriTeam
MySQL and MariaDB are prone to a security-bypass weakness.
-
-
16:00
»
SecuriTeam
Oracle MySQL Server is prone to a privilege-escalation vulnerability.
-
-
10:38
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1551-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysqld daemon or, potentially, execute arbitrary code with the privileges of the user running the mysqld daemon. All MySQL users should upgrade to these updated packages, which correct this issue. After installing this update, the MySQL server daemon will be restarted automatically.
-
10:38
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1551-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysqld daemon or, potentially, execute arbitrary code with the privileges of the user running the mysqld daemon. All MySQL users should upgrade to these updated packages, which correct this issue. After installing this update, the MySQL server daemon will be restarted automatically.
-
10:38
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1551-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysqld daemon or, potentially, execute arbitrary code with the privileges of the user running the mysqld daemon. All MySQL users should upgrade to these updated packages, which correct this issue. After installing this update, the MySQL server daemon will be restarted automatically.
-
-
21:20
»
Packet Storm Security Exploits
This Metasploit modules takes advantage of a file privilege misconfiguration problem specifically against Windows MySQL servers (due to the use of a .mof file). This may result in arbitrary code execution under the context of SYSTEM. However, please note in order to use this module, you must have a valid MySQL account on the target machine.
-
21:20
»
Packet Storm Security Recent Files
This Metasploit modules takes advantage of a file privilege misconfiguration problem specifically against Windows MySQL servers (due to the use of a .mof file). This may result in arbitrary code execution under the context of SYSTEM. However, please note in order to use this module, you must have a valid MySQL account on the target machine.
-
21:20
»
Packet Storm Security Misc. Files
This Metasploit modules takes advantage of a file privilege misconfiguration problem specifically against Windows MySQL servers (due to the use of a .mof file). This may result in arbitrary code execution under the context of SYSTEM. However, please note in order to use this module, you must have a valid MySQL account on the target machine.
-
18:37
»
Packet Storm Security Exploits
Oracle MySQL versions 5.5.19-log and below for Linux suffer from a stack-based overrun. This exploit yields a shell as the mysql uid.
-
8:03
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[remote exploits] - MySQL Windows Remote System Level Exploit (Stuxnet technique) 0day
-
8:03
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[remote exploits] - MySQL Remote Preauth User Enumeration Zeroday
-
4:52
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[dos / poc] - MySQL (Linux) Stack Based Buffer Overrun PoC Zeroday
-
4:49
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[remote exploits] - MySQL 5.1/5.5 WiNDOWS REMOTE R00T (mysqljackpot)
-
4:49
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[local exploits] - MySQL (Linux) Database Privilege Elevation Zeroday Exploit
-
4:48
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[dos / poc] - MySQL Denial of Service Zeroday PoC
-
4:48
»
0day.today (was: 1337day, Inj3ct0r, 1337db)
[dos / poc] - MySQL (Linux) Heap Based Overrun PoC Zeroday
-
-
16:00
»
SecuriTeam
Oracle MySQL Server is prone to a remote security vulnerability.
-
-
13:42
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-1462-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server.
-
13:42
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-1462-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server.
-
13:42
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-1462-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server.
-
-
19:28
»
Packet Storm Security Advisories
Ubuntu Security Notice 1621-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.66 in Ubuntu 10.04 LTS and Ubuntu 11.10. Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.28. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
19:28
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1621-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.66 in Ubuntu 10.04 LTS and Ubuntu 11.10. Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.28. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
19:28
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1621-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.66 in Ubuntu 10.04 LTS and Ubuntu 11.10. Ubuntu 12.04 LTS and Ubuntu 12.10 have been updated to MySQL 5.5.28. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
-
7:22
»
Packet Storm Security Tools
This is a modified version of synscan that checks credentials against MySQL instances and logs the output to mysqljack.pot.
-
-
7:35
»
Packet Storm Security Exploits
This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer. By default, the software installs a default password in MySQL, and binds the service to "0.0.0.0". This allows any remote user to login to MySQL, and then gain arbitrary remote code execution under the context of 'SYSTEM'. Examples of default credentials include: 'scrutinizer:admin', and 'scrutremote:admin'.
-
7:35
»
Packet Storm Security Recent Files
This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer. By default, the software installs a default password in MySQL, and binds the service to "0.0.0.0". This allows any remote user to login to MySQL, and then gain arbitrary remote code execution under the context of 'SYSTEM'. Examples of default credentials include: 'scrutinizer:admin', and 'scrutremote:admin'.
-
7:35
»
Packet Storm Security Misc. Files
This exploits an insecure config found in Scrutinizer NetFlow & sFlow Analyzer. By default, the software installs a default password in MySQL, and binds the service to "0.0.0.0". This allows any remote user to login to MySQL, and then gain arbitrary remote code execution under the context of 'SYSTEM'. Examples of default credentials include: 'scrutinizer:admin', and 'scrutremote:admin'.
-
-
17:00
»
SecuriTeam
Oracle MySQL Server is prone to a remote security vulnerability.
-
17:00
»
SecuriTeam
Oracle MySQL Server is prone to a remote security vulnerability.
-
17:00
»
SecuriTeam
Oracle MySQL Server is prone to a remote security vulnerability.
-
-
17:00
»
SecuriTeam
Oracle MySQL is prone to a security bypass vulnerability
-
-
17:00
»
SecuriTeam
Oracle MySQL Server is prone to a remote security vulnerability.
-
17:00
»
SecuriTeam
Oracle MySQL Server is prone to a remote security vulnerability.
-
-
7:21
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-0874-04 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash.
-
7:21
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-0874-04 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide such requests, causing mysqld to crash. This issue only caused a temporary denial of service, as mysqld was automatically restarted after the crash.
-
-
17:00
»
SecuriTeam
MySQL is prone to a denial-of-service vulnerability.
-
-
17:20
»
Packet Storm Security Advisories
Ubuntu Security Notice 1467-1 - It was discovered that certain builds of MySQL incorrectly handled password authentication on certain platforms. A remote attacker could use this issue to authenticate with an arbitrary password and establish a connection. MySQL has been updated to 5.5.24 in Ubuntu 12.04 LTS. Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10 have been updated to MySQL 5.1.63. A patch to fix the issue was backported to the version of MySQL in Ubuntu 8.04 LTS. Various other issues were also addressed.
-
17:20
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1467-1 - It was discovered that certain builds of MySQL incorrectly handled password authentication on certain platforms. A remote attacker could use this issue to authenticate with an arbitrary password and establish a connection. MySQL has been updated to 5.5.24 in Ubuntu 12.04 LTS. Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10 have been updated to MySQL 5.1.63. A patch to fix the issue was backported to the version of MySQL in Ubuntu 8.04 LTS. Various other issues were also addressed.
-
17:20
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1467-1 - It was discovered that certain builds of MySQL incorrectly handled password authentication on certain platforms. A remote attacker could use this issue to authenticate with an arbitrary password and establish a connection. MySQL has been updated to 5.5.24 in Ubuntu 12.04 LTS. Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10 have been updated to MySQL 5.1.63. A patch to fix the issue was backported to the version of MySQL in Ubuntu 8.04 LTS. Various other issues were also addressed.
-
-
2:11
»
Packet Storm Security Misc. Files
This is a simple python script for cracking MySQL MD5 passwords.
-
-
19:07
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1427-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.62 in Ubuntu 10.04 LTS, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.96. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
-
16:55
»
Packet Storm Security Advisories
Ubuntu Security Notice 1397-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.95. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
16:55
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1397-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.95. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
16:55
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1397-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 5.1.61 in Ubuntu 10.04 LTS, Ubuntu 10.10, Ubuntu 11.04 and Ubuntu 11.10. Ubuntu 8.04 LTS has been updated to MySQL 5.0.95. In addition to security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.
-
-
14:06
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-0127-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. These updated packages upgrade MySQL to version 5.0.95.
-
14:06
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-0127-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. These updated packages upgrade MySQL to version 5.0.95.
-
14:06
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-0127-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. These updated packages upgrade MySQL to version 5.0.95.
-
-
14:26
»
Packet Storm Security Advisories
Red Hat Security Advisory 2012-0105-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section.
-
14:26
»
Packet Storm Security Recent Files
Red Hat Security Advisory 2012-0105-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section.
-
14:26
»
Packet Storm Security Misc. Files
Red Hat Security Advisory 2012-0105-01 - MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory page, listed in the References section.
-
-
15:43
»
Packet Storm Security Recent Files
This is a small MySQL cracking tool capable of running login attempts from multiple threads in parallel. It is capable of 1024 concurrent connections.
-
15:43
»
Packet Storm Security Tools
This is a small MySQL cracking tool capable of running login attempts from multiple threads in parallel. It is capable of 1024 concurrent connections.
-
-
15:30
»
Packet Storm Security Exploits
This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the SELECT ... into DUMPFILE method of binary injection. On default Microsoft Windows installations of MySQL (=
-
15:30
»
Packet Storm Security Recent Files
This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the SELECT ... into DUMPFILE method of binary injection. On default Microsoft Windows installations of MySQL (=
-
15:30
»
Packet Storm Security Misc. Files
This Metasploit module creates and enables a custom UDF (user defined function) on the target host via the SELECT ... into DUMPFILE method of binary injection. On default Microsoft Windows installations of MySQL (=
-
9:01
»
Packet Storm Security Tools
yInjector is a MySQL injection penetration tool. It has multiple features, proxy support, and multiple exploitation methods.
-
-
13:20
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2011-012 - Multiple vulnerabilities has been found and corrected in mysql. storage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement. MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column. MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Various other issues have also been addressed.
-
13:20
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2011-012 - Multiple vulnerabilities has been found and corrected in mysql. storage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement. MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column. MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Various other issues have also been addressed.
-
13:20
»
Packet Storm Security Misc. Files
Mandriva Linux Security Advisory 2011-012 - Multiple vulnerabilities has been found and corrected in mysql. storage/innobase/dict/dict0crea.c in mysqld in MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service innodb_file_per_table configuration parameters for the InnoDB storage engine, then executing a DDL statement. MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column. MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Various other issues have also been addressed.
-
-
9:02
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1017-1 - It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. It was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. Various other issues were addressed as well.
-
9:02
»
Packet Storm Security Advisories
Ubuntu Security Notice 1017-1 - It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. It was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. Various other issues were addressed as well.
-
8:35
»
Packet Storm Security Advisories
Ubuntu Security Notice 1017-1 - It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. It was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. Various other issues were addressed as well.
-
8:35
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1017-1 - It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. It was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. Various other issues were addressed as well.
-
8:35
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1017-1 - It was discovered that MySQL incorrectly handled certain requests with the UPGRADE DATA DIRECTORY NAME command. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled joins involving a table with a unique SET column. It was discovered that MySQL incorrectly handled NULL arguments to IN() or CASE operations. An authenticated user could exploit this to make MySQL crash, causing a denial of service. It was discovered that MySQL incorrectly handled malformed arguments to the BINLOG statement. Various other issues were addressed as well.
-
-
19:01
»
Packet Storm Security Recent Files
Mandriva Linux Security Advisory 2010-155 - Multiple vulnerabilities has been found and corrected in mysql. MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service. Additionally many security issues noted in the 5.1.49 release notes have been addressed with this advisory as well.The updated packages have been patched to correct these issues.
-
19:00
»
Packet Storm Security Advisories
Mandriva Linux Security Advisory 2010-155 - Multiple vulnerabilities has been found and corrected in mysql. MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service. Additionally many security issues noted in the 5.1.49 release notes have been addressed with this advisory as well.The updated packages have been patched to correct these issues.