Percona

Xtrabackup

6 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Published 07.06.2023 01:15:38
  • Last modified 21.11.2024 06:53:05

In Percona XtraBackup (PXB) through 2.2.24 and 3.x through 8.0.27-19, a crafted filename on the local file system could trigger unexpected command shell execution of arbitrary commands.

  • EPSS 0.37%
  • Published 02.06.2022 18:15:09
  • Last modified 21.11.2024 06:54:50

Percona XtraBackup 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to th...

  • EPSS 0.68%
  • Published 27.04.2020 13:15:12
  • Last modified 21.11.2024 04:56:32

Percona XtraBackup before 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also writte...

Exploit
  • EPSS 0.28%
  • Published 29.09.2017 01:34:47
  • Last modified 20.04.2025 01:37:25

The version checking subroutine in percona-toolkit before 2.2.13 and xtrabackup before 2.2.9 was vulnerable to silent HTTP downgrade attacks and Man In The Middle attacks in which the server response could be modified to allow the attacker to respond...

  • EPSS 0.5%
  • Published 23.03.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

xbcrypt in Percona XtraBackup before 2.3.6 and 2.4.x before 2.4.5 does not properly set the initialization vector (IV) for encryption, which makes it easier for context-dependent attackers to obtain sensitive information from encrypted backup files v...

  • EPSS 0.06%
  • Published 13.12.2013 18:07:54
  • Last modified 11.04.2025 00:51:21

Percona XtraBackup before 2.1.6 uses a constant string for the initialization vector (IV), which makes it easier for local users to defeat cryptographic protection mechanisms and conduct plaintext attacks.