[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250770

 
 

909

 
 

196157

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195419 Download | Alert*

The dump package contains both dump and restore. Dump examines files in a filesystem, determines which ones need to be backed up, and copies those files to a specified disk, tape, or other storage medium. The restore command performs the inverse function of dump; it can restore a full backup of a filesystem. Subsequent incremental backups can then be layered on top of the full backup. Single files ...

The dump package contains both dump and restore. Dump examines files in a filesystem, determines which ones need to be backed up, and copies those files to a specified disk, tape, or other storage medium. The restore command performs the inverse function of dump; it can restore a full backup of a filesystem. Subsequent incremental backups can then be layered on top of the full backup. Single files ...

The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Install. Successful exploitation allows attackers to affect confidentiality and integrity.

The host is installed with Oracle MySQL 5.5.29 or earlier or 5.1.67 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.1.67 or earlier, 5.5.29 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.1.67 or earlier or 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Partition. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.1.67 or earlier or 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to affect confidentiality, integrity and availability.


Pages:      Start    11129    11130    11131    11132    11133    11134    11135    11136    11137    11138    11139    11140    11141    11142    ..   19541

© SecPod Technologies