MySQL Server RENAME TABLE System Table Overwrite Vulnerability

To exploit this issue, attackers can use standard database client software in conjuction with standard operating system utilities.


 

Privacy Statement
Copyright 2010, SecurityFocus