Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2012-2122 — Improper Authentication in Mariadb
Severity
5.1MEDIUMNVD
EPSS
93.9%
top 0.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 26
Latest updateOct 29
Description
sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
CVSS vector
AV:N/AC:H/C:P/I:P/A:PExploitability: 4.9 | Impact: 6.4
Affected Packages2 packages
Patches
🔴Vulnerability Details
1💥Exploits & PoCs
2Nuclei▶
MySQL - Authentication Bypass
📋Vendor Advisories
2📄Research Papers
1arXiv▶
AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios↗2025-10-29