Percona XtraBackup before 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when –history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table.
Source link
[Bug 1828442] CVE-2020-10997 percona-xtrabackup: Information exposure via cmd line output and table history
RELATED STORIES
Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over...
Critical vulnerability found in Snow Software’s Inventory Agent A vulnerability in Snow Software’s Snow Inventory Agent...
Hello everyone, I have returned to tackle part four of my series on Windows exploitation,...
Yeastar NeoGate TG400 中存在路径遍历漏洞。该漏洞源于产品未能正确地过滤资源或文件路径中的特殊元素,经过身份验证的用户可以解密固件,并可以读取敏感信息,如密码或解密密钥。以下产品及版本受到影响:Yeastar NeoGate TG400 91.3.0.3。 Copyright © 北京奇虎科技有限公司 360网络攻防实验室 安全客 All Rights Reserved...
Description: Luxion KeyShot versions prior to 10.1, Luxion KeyShot Viewer versions prior to 10.1, Luxion...
# -*- coding: utf-8 -*- import socket from time import sleep from os import system...
Source: Bombardier Business jet maker Bombardier is the latest company to suffer a data breach...
NEW RESOURCES National Gallery of Art: National Gallery of Art Announces Launch of Kress Collection...
Κινέζοι χάκερ “κλωνοποίησαν” και χρησιμοποιούσαν για χρόνια ένα zero-day exploit των Windows που κλάπηκε από...
In fact it was foreshadowed by Facebook itself, who told the government last year that...
You must be logged in to post a comment.