Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pxgm-cjcm-fmcg

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.

EPSS

Процентиль: 56%
0.0034
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.

redhat
больше 20 лет назад

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.

nvd
больше 20 лет назад

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable file names when creating temporary tables, which allows local users with CREATE TEMPORARY TABLE privileges to overwrite arbitrary files via a symlink attack.

debian
больше 20 лет назад

MySQL 4.0.23 and earlier, and 4.1.x up to 4.1.10, uses predictable fil ...

EPSS

Процентиль: 56%
0.0034
Низкий