Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 5 2006-702: mysql


Vulnerability Assessment Details

Fedora Core 5 2006-702: mysql

Vulnerability Assessment Summary
Check for the version of the mysql package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-702 (mysql).

MySQL is a multi-user, multi-threaded SQL database server. MySQL is a
client/server implementation consisting of a server daemon (mysqld)
and many different client programs and libraries. The base package
contains the MySQL client programs, the client shared libraries, and
generic MySQL files.

Update Information:

Repairs vulnerability in multibyte string escaping.


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

WD Drive My Passport 512GB Solid State Drive Western Digital Type-C
$89.06
WD Drive  My Passport 512GB Solid State Drive Western Digital Type-C picture**NEW SEALED**Kingston SSDNow ms200 120GB mSATA Solid State Drive
$55.0
**NEW SEALED**Kingston SSDNow ms200 120GB mSATA Solid State Drive pictureSanDisk SSD PLUS 120GB Solid State Drive (SDSSDA-120G-G26) [READ DESCRIPTION]
$55.0
SanDisk SSD PLUS 120GB Solid State Drive (SDSSDA-120G-G26) [READ DESCRIPTION] pictureSAMSUNG 960 EVO MZ-V6E250BW 250 GB Internal Solid State Drive - PCIe 3.0 x4 -
$114.18
SAMSUNG 960 EVO MZ-V6E250BW 250 GB Internal Solid State Drive - PCIe 3.0 x4 - picture


Discussions

No Discussions have been posted on this vulnerability.