MySQL Multiple Vulnerabilities
MySQL is reported prone to multiple vulnerabilities that can be exploited by a remote authenticated attacker. The first vulnerability is an insecure temporary file-creation vulnerability, which can be exploited by an attacker with 'CREATE TEMPORARY TABLE' privileges on an affected installation to corrupt files with the privileges of the MySQL process. The second vulnerability is an input-validation vulnerability, which can be exploited by remote attackers with INSERT and DELETE privileges on the 'mysql' administrative database to load and execute a malicious library in the context of the MySQL process. The third vulnerability is a remote arbitrary-code execution vulnerability, which can be triggered by employing the 'CREATE FUNCTION' statement to manipulate functions to control sensitive data structures. This issue may be exploited to execute arbitrary code in the context of the database process.