3.6

CVE-2010-1626

MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.

Data is provided by the National Vulnerability Database (NVD)
MysqlMysql Version <= 5.1.45
MysqlMysql Version5.0.5.0.21
MysqlMysql Version5.0.15
MysqlMysql Version5.0.16
MysqlMysql Version5.0.17
MysqlMysql Version5.0.20
MysqlMysql Version5.0.24
MysqlMysql Version5.0.45b
MysqlMysql Version5.0.82
MysqlMysql Version5.0.84
MysqlMysql Version5.0.87
MysqlMysql Version5.1.5
MysqlMysql Version5.1.23
MysqlMysql Version5.1.31
MysqlMysql Version5.1.32
MysqlMysql Version5.1.34
MysqlMysql Version5.1.37
OracleMysql Version5.0.18
OracleMysql Version5.0.19
OracleMysql Version5.0.21
OracleMysql Version5.0.22
OracleMysql Version5.0.23
OracleMysql Version5.0.27
OracleMysql Version5.0.33
OracleMysql Version5.0.37
OracleMysql Version5.0.41
OracleMysql Version5.0.45
OracleMysql Version5.0.51
OracleMysql Version5.0.67
OracleMysql Version5.0.75
OracleMysql Version5.0.77
OracleMysql Version5.0.81
OracleMysql Version5.0.83
OracleMysql Version5.0.85
OracleMysql Version5.0.86
OracleMysql Version5.0.88
OracleMysql Version5.0.89
OracleMysql Version5.0.90
OracleMysql Version5.0.91
OracleMysql Version5.1.30
OracleMysql Version5.1.33
OracleMysql Version5.1.35
OracleMysql Version5.1.36
OracleMysql Version5.1.38
OracleMysql Version5.1.39
OracleMysql Version5.1.40
OracleMysql Version5.1.41
OracleMysql Version5.1.42
OracleMysql Version5.1.43
OracleMysql Version5.1.44
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.08% 0.252
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 3.6 3.9 4.9
AV:L/AC:L/Au:N/C:N/I:P/A:P
CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.