[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-8467":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":49,"name":50,"published":51,"updated":34},8467,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":34,"risk_description":35,"public_description":36,"public_recommendation":37,"recommendation":34,"references":38,"cvssv3":34,"epss_score":44,"epss_percentile":45,"cve":46,"in_cisa_catalog":48,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"Successful exploitation will yield unauthorized access to the database.","MySQL / MariaDB is prone to an authentication bypass.","Update to: - MariaDB version 5.1.62, 5.2.12, 5.3.6, 5.5.23 or later - MySQL version 5.1.63, 5.5.24, 5.6.6 or later",[39,40,41,42,43],"http://bugs.mysql.com/bug.php?id=64884","http://www.securityfocus.com/bid/53911","https://mariadb.atlassian.net/browse/MDEV-212","https://web.archive.org/web/20131027090831/http://www.h-online.com:80/open/news/item/Simple-authentication-bypass-for-MySQL-root-revealed-Update-1614990.html","http://seclists.org/oss-sec/2012/q2/493",0.93918,0.99877,[47],"CVE-2012-2122",false,"NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.103492","MySQL / MariaDB Authentication Bypass (Apr 2012) - Active Check","2018-01-02T00:00:00Z"]