[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27034 Download | Alert*

The host is installed with Oracle MySQL 5.0 before 5.0.66, 5.1 before 5.1.26 or 6.0 before 6.0.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle handle a b'' (b single-quote single-quote) token. Successful exploitation allows remote attackers to cause a denial of service (daemon crash).

The host is installed with Oracle MySQL 5.1 before 5.1.46 and is prone to privilege escalation vulnerability. A flaw is present in the application, which does not check privileges before uninstalling a plugin. Successful exploitation allows remote attackers to uninstall arbitrary plugins.

The host is installed with Oracle MySQL 5.1 before 5.1.46 and is prone to security bypass vulnerability. A flaw is present in the application, which fails to properly handle a symlink attack in conjunction with the DROP TABLE command. Successful exploitation allows local users to delete the data and index files of another user's MyISAM table.

The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a join query that uses a table with a unique SET column. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).

The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Successful exploitation allows remote authenticated users to cause a denial of service (crash).

The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers an access of uninitialized memory. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).

The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).

The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform alternate reads from two indexes on a table, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).

The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).

The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).


Pages:      Start    1345    1346    1347    1348    1349    1350    1351    1352    1353    1354    1355    1356    1357    1358    ..   2703

© SecPod Technologies