The host is installed with Oracle MySQL 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Stored Procedure. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows local users to affect confidentiality and integrity.
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows remote attackers to affect availability.
The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect confidentiality and integrity.
The host is installed with Oracle MySQL 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to MyISAM. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Partition. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle some unknown vectors. Successful exploitation allows remote authenticated users with Server Privileges to affect availability.
The host is installed with Oracle MySQL 5.1.x through 5.1.65 or 5.5.x through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to GIS Extension. Successful exploitation allows remote authenticated users to affect availability.