The host is installed with Oracle MySQL 5.0 before 5.0.66, 5.1 before 5.1.26 or 6.0 before 6.0.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle handle a b'' (b single-quote single-quote) token. Successful exploitation allows remote attackers to cause a denial of service (daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.46 and is prone to privilege escalation vulnerability. A flaw is present in the application, which does not check privileges before uninstalling a plugin. Successful exploitation allows remote attackers to uninstall arbitrary plugins.
The host is installed with Oracle MySQL 5.1 before 5.1.46 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack in conjunction with the DROP TABLE command. Successful exploitation allows local users to delete the data and index files of another user's MyISAM table.
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a join query that uses a table with a unique SET column. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Successful exploitation allows remote authenticated users to cause a denial of service (crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers an access of uninitialized memory. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform alternate reads from two indexes on a table, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).