[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to CLIENT:MYSQLDUMP. Successful exploitation allows remote authenticated users to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to CLIENT:MYSQLADMIN. Successful exploitation allows local users to affect confidentiality.

The host is installed with Oracle MySQL 5.5.x through 5.5.39 or MySQL 5.6.x through 5.6.20 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to SERVER:DML. Successful exploitation allows remote authenticated users to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.39 or MySQL 5.6.x through 5.6.20 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to C API SSL CERTIFICATE HANDLING. Successful exploitation allows remote attackers to affect confidentiality.

The host is installed with Oracle MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to SERVER:INNODB FULLTEXT SEARCH DML. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with libXfont before 1.4.8 or 1.4.9x before 1.4.99.901 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to metadata. Successful exploitation could allow attackers to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-b ...

The host is installed with libXfont before 1.4.8 or 1.4.9x before 1.4.99.901 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted xfs protocol reply. Successful exploitation could allow attackers to execute arbitrary code

The host is installed with libXfont before 1.4.8 or 1.4.9x before 1.4.99.901 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle a crafted xfs reply. Successful exploitation could allow attackers to execute arbitrary code

The host is installed with mysql55-mysql 5.5.35 or earlier or mariadb55-mariadb 5.5.35 or earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle vectors related to ENFED. Successful exploitation could allow attackers to affect availability

The host is installed with mysql55-mysql 5.5.37 or earlier or mariadb55-mariadb 5.5.37 or earlier and is prone to an unspecified vulnerability. A flaw is present in the applications, which fail to handle vectors related to SRINFOSC. Successful exploitation could allow attackers to affect confidentiality, integrity and availability


Pages:      Start    7546    7547    7548    7549    7550    7551    7552    7553    7554    7555    7556    7557    7558    7559    ..   19541

© SecPod Technologies