SQL injection vulnerability in MySQL 4.1.x before 4.1.20 and 5.0.x before 5.0.22 allows context-dependent attackers to execute arbitrary SQL commands via crafted multibyte encodings in character sets such as SJIS, BIG5, and GBK, which are not properly handled when the mysql_real_escape function is used to escape the input.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mysql | Mysql | 5.0.5 | 5.0.5 |
Mysql | Mysql | 5.0.10 | 5.0.10 |
Mysql | Mysql | 5.0.0 | 5.0.0 |
Mysql | Mysql | 5.0.15 | 5.0.15 |
Mysql | Mysql | 5.0.17 | 5.0.17 |
Mysql | Mysql | 4.1.13 | 4.1.13 |
Mysql | Mysql | 5.0.3 | 5.0.3 |
Mysql | Mysql | 4.1.15 | 4.1.15 |
Mysql | Mysql | 4.1.8 | 4.1.8 |
Mysql | Mysql | 4.1.14 | 4.1.14 |
Mysql | Mysql | 4.1.12 | 4.1.12 |
Mysql | Mysql | 4.1.10 | 4.1.10 |
Mysql | Mysql | 5.0.2 | 5.0.2 |
Mysql | Mysql | 5.0.20 | 5.0.20 |
Mysql | Mysql | 5.0.1 | 5.0.1 |
Mysql | Mysql | 4.1.0 | 4.1.0 |
Mysql | Mysql | 5.0.4 | 5.0.4 |
Mysql | Mysql | 4.1.3 | 4.1.3 |
Mysql | Mysql | 5.0.16 | 5.0.16 |
Mysql | Mysql | 4.1.2 | 4.1.2 |
Mysql | Oracle | 4.1.1 | 4.1.1 |
Mysql | Oracle | 4.1.4 | 4.1.4 |
Mysql | Oracle | 4.1.5 | 4.1.5 |
Mysql | Oracle | 4.1.6 | 4.1.6 |
Mysql | Oracle | 4.1.7 | 4.1.7 |
Mysql | Oracle | 4.1.9 | 4.1.9 |
Mysql | Oracle | 4.1.11 | 4.1.11 |
Mysql | Oracle | 4.1.16 | 4.1.16 |
Mysql | Oracle | 4.1.17 | 4.1.17 |
Mysql | Oracle | 4.1.18 | 4.1.18 |
Mysql | Oracle | 4.1.19 | 4.1.19 |
Mysql | Oracle | 5.0.6 | 5.0.6 |
Mysql | Oracle | 5.0.11 | 5.0.11 |
Mysql | Oracle | 5.0.12 | 5.0.12 |
Mysql | Oracle | 5.0.13 | 5.0.13 |
Mysql | Oracle | 5.0.14 | 5.0.14 |
Mysql | Oracle | 5.0.18 | 5.0.18 |
Mysql | Oracle | 5.0.19 | 5.0.19 |
Mysql | Oracle | 5.0.21 | 5.0.21 |
Mysql | Oracle | 5.0.7 | 5.0.7 |
Mysql | Oracle | 5.0.8 | 5.0.8 |
Mysql | Oracle | 5.0.9 | 5.0.9 |