[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27041 Download | Alert*

The host is installed with Oracle MySQL Server through 5.7.40 or 8.0.31 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Connection Handling. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 8.0.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 8.0.31 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 8.0.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Thread Pooling. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 8.0.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The host is installed with Oracle MySQL Server through 8.0.30 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server: Optimizer. Successful exploitation allows attackers to affect Availability.

The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.

The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a memory corruption vulnerability. A flaw is present in the DecodeBlock function in codec/sdl_image.c, which fails to properly handle a crafted file. Successful exploitation can cause denial of service.

The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to a denial of service vulnerability. A flaw is present in the libmicrodns, which fails to properly handle compressed labels in mDNS messages. Successful exploitation can cause denial of service.

The host is installed with VideoLAN VLC media player 3.0.0 before 3.0.9 and is prone to an arbitrary code execution vulnerability. A flaw is present in the libmicrodns, which fails to properly handle compressed labels in mDNS messages. Successful exploitation allows attacker to execute arbitrary code.


Pages:      Start    1086    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    1098    1099    ..   2704

© SecPod Technologies