Логотип exploitDog
bind:CVE-2006-0369
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-0369

Количество 3

Количество 3

nvd логотип

CVE-2006-0369

почти 20 лет назад

MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that the availability of the schema is a normal and sometimes desired aspect of database access

CVSS2: 2.1
EPSS: Низкий
debian логотип

CVE-2006-0369

почти 20 лет назад

MySQL 5.0.18 allows local users with access to a VIEW to obtain sensit ...

CVSS2: 2.1
EPSS: Низкий
github логотип

GHSA-wq2p-hcf7-x7cq

больше 3 лет назад

** DISPUTED ** MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that the availability of the schema is a normal and sometimes desired aspect of database access.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2006-0369

MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that the availability of the schema is a normal and sometimes desired aspect of database access

CVSS2: 2.1
0%
Низкий
почти 20 лет назад
debian логотип
CVE-2006-0369

MySQL 5.0.18 allows local users with access to a VIEW to obtain sensit ...

CVSS2: 2.1
0%
Низкий
почти 20 лет назад
github логотип
GHSA-wq2p-hcf7-x7cq

** DISPUTED ** MySQL 5.0.18 allows local users with access to a VIEW to obtain sensitive information via the "SELECT * FROM information_schema.views;" query, which returns the query that created the VIEW. NOTE: this issue has been disputed by third parties, saying that the availability of the schema is a normal and sometimes desired aspect of database access.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу