MySQL is vulnerable to directory traversal. Due to the way MySQL handled the parameters of the MySQL COM_FIELD_LIST network protocol command, an authenticated database user could use this flaw to obtain descriptions of the fields of an arbitrary table using a request with a specially-crafted table name.
bugs.mysql.com/bug.php?id=53371
dev.mysql.com/doc/refman/5.0/en/news-5-0-91.html
dev.mysql.com/doc/refman/5.1/en/news-5-1-47.html
lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
lists.mysql.com/commits/107532
lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
lists.opensuse.org/opensuse-security-announce/2010-11/msg00005.html
securitytracker.com/id?1024031
support.apple.com/kb/HT4435
www.mandriva.com/security/advisories?name=MDVSA-2010:107
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0442.html
www.redhat.com/support/errata/RHSA-2010-0824.html
www.ubuntu.com/usn/USN-1397-1
access.redhat.com/errata/RHSA-2010:0442
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10258
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7210