MySQL 3.20 up to and including 4.1.0 uses a weak algorithm for hashed passwords, which makes it easier for malicious users to decrypt the password via brute force methods.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
oracle mysql 3.22 |
||
oracle mysql 3.22.27 |
||
oracle mysql 3.23.10 |
||
oracle mysql 3.23.22 |
||
oracle mysql 3.23.24 |
||
oracle mysql 3.23.28 |
||
oracle mysql 3.23.3 |
||
oracle mysql 3.23.36 |
||
oracle mysql 3.23.38 |
||
oracle mysql 3.23.44 |
||
oracle mysql 3.23.46 |
||
oracle mysql 3.23.50 |
||
oracle mysql 3.23.52 |
||
oracle mysql 3.23.8 |
||
oracle mysql 4.0.0 |
||
oracle mysql 4.0.8 |
||
mysql mysql 4.1.0 |
||
oracle mysql 3.22.28 |
||
oracle mysql 3.22.29 |
||
oracle mysql 3.22.30 |
||
oracle mysql 3.22.32 |
||
oracle mysql 3.23.31 |
||
oracle mysql 3.23.32 |
||
oracle mysql 3.23.33 |
||
oracle mysql 3.23.34 |
||
oracle mysql 3.23.47 |
||
oracle mysql 3.23.48 |
||
oracle mysql 3.23.49 |
||
oracle mysql 3.23.5 |
||
oracle mysql 4.0.1 |
||
oracle mysql 4.0.11 |
||
oracle mysql 4.0.2 |
||
oracle mysql 4.0.3 |
||
oracle mysql 4.0.5a |
||
oracle mysql 3.20 |
||
oracle mysql 3.20.32a |
||
oracle mysql 3.23.25 |
||
oracle mysql 3.23.26 |
||
oracle mysql 3.23.27 |
||
oracle mysql 3.23.39 |
||
oracle mysql 3.23.4 |
||
oracle mysql 3.23.40 |
||
oracle mysql 3.23.41 |
||
oracle mysql 3.23.42 |
||
oracle mysql 3.23.53a |
||
oracle mysql 3.23.54 |
||
oracle mysql 3.23.54a |
||
oracle mysql 3.23.55 |
||
oracle mysql 4.1.0 |
||
oracle mysql 3.21 |
||
oracle mysql 3.22.26 |
||
oracle mysql 3.23.2 |
||
oracle mysql 3.23.23 |
||
oracle mysql 3.23.29 |
||
oracle mysql 3.23.30 |
||
oracle mysql 3.23.35 |
||
oracle mysql 3.23.37 |
||
oracle mysql 3.23.43 |
||
oracle mysql 3.23.45 |
||
oracle mysql 3.23.51 |
||
oracle mysql 3.23.53 |
||
oracle mysql 3.23.56 |
||
oracle mysql 3.23.9 |
||
oracle mysql 4.0.7 |
||
oracle mysql 4.0.9 |