MySQL have some vulnerabilities, which can be exploited by
	    malicious users to disclose potentially sensitive information
	    and compromise a vulnerable system.
	  1) An error within the code that generates an error response
	    to an invalid COM_TABLE_DUMP packet can be exploited by an
	    authenticated client to disclosure certain memory content of the
	    server process.
	  2) A boundary error within the handling of specially crafted
	    invalid COM_TABLE_DUMP packets can be exploited by an authenticated
	    client to cause a buffer overflow and allows arbitrary code
	    execution.
	  3) An error within the handling of malformed login packets can be
	    exploited to disclosure certain memory content of the server
	    process in the error messages.