[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with Oracle MySQL Server 5.6.12 and earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to InnoDB. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Data Manipulation Language. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Impeached. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Privileges. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Data Manipulation Language. Successful exploitation allows attackers to affect availability.

sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.

The host is installed with the VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to a privilege escalation vulnerability. The application fails to properly handle the COM classes used by the VMX process. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, le ...

The host is installed with the VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to a privilege escalation vulnerability. The application fails to properly handle the path to the VMX executable, on a Windows host. Successful exploitation of this issue may allow the path to the VMX executable, on a Windows host, to be hija ...

The host is installed with the VMware Workstation 14.x before 14.1.1 or VMware Player 14.x before 14.1.1 and is prone to a denial of service vulnerability . A flaw is present in the application, which can be triggered by opening a large number of VNC sessions. Successful exploitation could result in denial of service.


Pages:      Start    1408    1409    1410    1411    1412    1413    1414    1415    1416    1417    1418    1419    1420    1421    ..   1516

© SecPod Technologies