The host is installed with Oracle MySQL 5.5.29 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect confidentiality, integrity and availability.
The host is installed with OpenSSL before 0.9.8j and is prone to security bypass vulnerability. A flaw is present in the application, which does not prevent modification of the ciphersuite in the session cache. Successful exploitation could allow remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic.
Mozilla Thunderbird 60.7.1: A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in parser_get_next_char when processing certain email messages, resulting in a potentially exploitable crash.
Mozilla Thunderbird 60.7.1: A flaw in Thunderbird's implementation of iCal causes a heap buffer overflow in icalmemory_strdup_and_dequote when processing certain email messages, resulting in a potentially exploitable crash.
The host is installed with VideoLAN VLC media player before 3.0.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle an invalid AVI file. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with MySQL 5.1.x before 5.1.68 or 5.5.x before 5.5.30 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with MySQL 5.1.x before 5.1.68 or 5.5.x before 5.5.28 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allows attackers to execute arbitrary code.
The host is installed with Oracle MySQL Server through 5.6.38 or through 5.7.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server : Security : Privileges. Successful exploitation allows attackers to affect Availability.
The host is installed with Oracle VM VirtualBox 5.2.x before 5.2.28 or 6.0.x before 6.0.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality.
The host is installed with Oracle VM VirtualBox 5.2.x before 5.2.28 or 6.0.x before 6.0.6 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Core. Successful exploitation allows attackers to affect Confidentiality, Integrity and Availability.