### [CVE-2009-5026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5026) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The executable comment feature in MySQL 5.0.x before 5.0.93 and 5.1.x before 5.1.50, when running in certain slave configurations in which the slave is running a newer version than the master, allows remote attackers to execute arbitrary SQL commands via custom comments. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/DButter/whitehat_public - https://github.com/Dokukin1/Metasploitable - https://github.com/Iknowmyname/Nmap-Scans-M2 - https://github.com/NikulinMS/13-01-hw - https://github.com/Zhivarev/13-01-hw - https://github.com/scmanjarrez/CVEScannerV2 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems - https://github.com/tomwillfixit/alpine-cvecheck - https://github.com/zzzWTF/db-13-01