Subject: Technology
Type: Analytical Essay
Pages: 3
Word count: 807
Topics: Data Analysis, Computer Science, Cyber Security

MySQL Database

MySQL database is associated with many security vulnerabilities that grant access to potential hackers. The vulnerabilities include SQL injection attacks, arbitrary code execution, and exploit of the database through bypassing password verification. MySQL is also vulnerable when the server crashes because it leads to the extraction of sensitive data without being detected (Litchfield, 2007).

SQL Injection Attacks

In this technique, the code is injected by executing malicious SQL statements into the database that attacks data-driven applications. 

Arbitrary Code Execution

Because of the weakness of remote code execution, a cyberpunk can intervene in the system through arbitrary code and manipulate the configuration file and adding arbitrary library in MySQL data in the start. (Litchfield, 2007). 

Password Verification Bypass

The authentication protocol is compromised in MySQL because the protocol simply examines the password hash and not the whole password itself that gives privilege to the attacker to hack the system if password hash is determined (Litchfield, 2007). 


HTTP has numerous weakness points that are specified as Stateless, bound checking, Caching, limited content, traffic privacy, and denial of service and DNS related issues.


Man-in-Middle attacks are caused due to the statelessness of HTTP and through this attack a hacker can intrude between the communications of two parties without their knowledge (Young & Aitel, 2004).  

Bound Checking

Due to the limitation of bound checking for data supplied, a hacker applies application-layer exploits such as buffer overflows that shifts set character, CGI, MIME-type vulnerabilities (Young & Aitel, 2004).


HTTP caches are usually sensitive data that includes security data or account information which makes them attractive for hacking and causing harm to cache data in different areas of the Internet (Young & Aitel, 2004).

Limited Content

Protocol limitation of content delivers an advantage to hackers to attack web servers, back-end applications servers and web clients through encoding malicious code in HTTP message data (Young & Aitel, 2004).  

Traffic Privacy

The unavailability of traffic privacy or encryption in HTTP protocol causes an interruption in account information, URLs, and responsive data that can reveal confidential information of a site that is harmful to e-commerce sites (Young & Aitel, 2004).  

Essay writing service:
  • Excellent quality
  • 100% Turnitin-safe
  • Affordable prices

SMB Windows Server 2008

SMB Windows Server 2008 is also vulnerable in multiple criterions that include includes remote code execution and information disclosure. 

Remote Code Execution

Windows server is weak in remote code execution due to the Microsoft Server Message block 1.0 (SMBv1) that runs certain requests that can be exploited by sending a specially crafted packet to SMBv1 server (Cisecurity, 2016). 

Information Disclosure 

Microsoft Server Message Block 1.0 (SMBv1) handles memory requests in such a way that it creates information disclosure due to which hacker accesses the server in the same way as an admin user and easily manipulates the data or remove it and builds new account using complete rights (Cisecurity, 2016).  


SMB XP has some of the most critical vulnerabilities that include DNS, Remote Code Execution, and Pragmatic General Multicast protocol that can be easily penetrated by an attacker (Cisecurity, 2017).

DNS (Domain Name System)

DNS weakness allows spoofing, and the attacker can redirect the network traffic intended for systems on the Internet towards the attacker’s system. 

Remote Code Execution

Due to ineffectiveness of SMB protocol, remote code execution is affected and allows the attacker to install programs, manipulate data or even remove the data with complete user access control (Cisecurity, 2017).  

Get your paper done on time by an expert in your field.
plagiarism free

Pragmatic General Multicast

PGM vulnerability opens a loop hole for the hacker to make the system non-responsive and it stuck at one point therefore, resulting in shutdown to restore the system. However, the denial of service does not enable the hacker to execute code or manage user rights (Cisecurity, 2017).


Telnet contains NCSA and numerous Buffer Overflow vulnerabilities that can cause affect the user’s system. 

Buffer Overflow

A hacker can activate a buffer overflow that results in the creation of DOS (denial of service) condition and also capable of executing arbitrary code with root privileges that could result in access to the user’s system (Cisco, 2004).


Due to NCSA vulnerability, an attacker can connect to a PC via FTP server by running default configuration of NCSA telnet and access sensitive data and system files making the system vulnerable (Cisco, 2004). 

Port 8080

Port 8080 is designed for managing secondary or alternate web services if port 80 is already in use. Port 8080 is vulnerable to different types of buffer overflow that allows the attacker to open a backdoor and decreases the security level of the infected computer. Through this backdoor, an attacker can upload malicious code or tamper with default settings to redirect traffic. Port 8080 is also vulnerable in its CGI scripts due to its bypassing phenomena that can cause exploitation. The open port enables the attacker to upload malicious code and allows remote access to flawed routers (Vacca, 2013).

Need a custom paper ASAP?
We can do it today.
Tailored to your instructions. 0% plagiarism.

Did you like this sample?
  1. Cisco, 2004. Telnet daemon buffer overflow vulnerability. [Online] Available at: <> [Accessed 15 January 2018].
  2. Cisecurity, 2016. Multiple vulnerabilities in MySQL, PerconaDB, and MariaDB could allow for arbitrary code execution. [Online] Available at: <> [Accessed 15 January 2018].
  3. Cisecurity, 2017. Multiple vulnerabilities in Microsoft Windows SMB server could allow for remote code execution. [Online] Available at: <> [Accessed 15 January 2018].
  4. Litchfield, D., 2007. The database hacker’s handbook: defending database servers. Indianapolis: John Wiley & Sons.
  5. Young, S.E. & Aitel, D., 2004. The hacker’s handbook: the strategy behind breaking into and defending networks. New York: CRC Press Company.
  6. Vacca, J.R., 2013. Computer and information security handbook. Massachusetts: Newnes.
Related topics
More samples
Related Essays