FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The last vuln.xml file processed by FreshPorts is:

Revision:  368515
Date:      2014-09-18
Time:      19:53:09Z
Committer: madpilot

List all Vulnerabilities, by package

List all Vulnerabilities, by date

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
2e129846-8fbb-11d8-8b29-0020ed76ef5aMySQL insecure temporary file creation (mysqlbug)

Shaun Colley reports that the script `mysqlbug' included with MySQL sometimes creates temporary files in an unsafe manner. As a result, an attacker may create a symlink in /tmp so that if another user invokes `mysqlbug' and quits without making any changes, an arbitrary file may be overwritten with the bug report template.


Discovery 2004-03-25
Entry 2004-04-16
Modified 2004-05-21
mysql-client
ge 4.0 lt 4.0.20

ge 4.1 lt 4.1.1_2

ge 5.0 lt 5.0.0_2

http://marc.theaimsgroup.com/?l=bugtraq&m=108023246916294&w=2
http://bugs.mysql.com/bug.php?id=3284
9976
CVE-2004-0381
4775c807-8f30-11dd-821f-001cc0377035mysql -- command line client input validation vulnerability

Thomas Henlich reports:

The mysql command-line client does not quote HTML special characters like < in its output. This allows an attacker who is able to write data into a table to hide or modify records in the output, and to inject potentially dangerous code, e. g. Javascript to perform cross-site scripting or cross-site request forgery attacks.


Discovery 2007-04-17
Entry 2008-10-01
Modified 2008-10-10
mysql-client
gt 5.1 lt 5.1.28_1

gt 5.0 lt 5.0.67_1

31486
http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/
2e129846-8fbb-11d8-8b29-0020ed76ef5aMySQL insecure temporary file creation (mysqlbug)

Shaun Colley reports that the script `mysqlbug' included with MySQL sometimes creates temporary files in an unsafe manner. As a result, an attacker may create a symlink in /tmp so that if another user invokes `mysqlbug' and quits without making any changes, an arbitrary file may be overwritten with the bug report template.


Discovery 2004-03-25
Entry 2004-04-16
Modified 2004-05-21
mysql-client
ge 4.0 lt 4.0.20

ge 4.1 lt 4.1.1_2

ge 5.0 lt 5.0.0_2

http://marc.theaimsgroup.com/?l=bugtraq&m=108023246916294&w=2
http://bugs.mysql.com/bug.php?id=3284
9976
CVE-2004-0381
4775c807-8f30-11dd-821f-001cc0377035mysql -- command line client input validation vulnerability

Thomas Henlich reports:

The mysql command-line client does not quote HTML special characters like < in its output. This allows an attacker who is able to write data into a table to hide or modify records in the output, and to inject potentially dangerous code, e. g. Javascript to perform cross-site scripting or cross-site request forgery attacks.


Discovery 2007-04-17
Entry 2008-10-01
Modified 2008-10-10
mysql-client
gt 5.1 lt 5.1.28_1

gt 5.0 lt 5.0.67_1

31486
http://www.henlich.de/it-security/mysql-command-line-client-html-injection-vulnerability/