The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Security : Firewall. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Security : Firewall. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Memcached. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Client. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Security : Privileges. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : Security : Firewall. Successful exploitation allows remote authenticated users to affect integrity.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Partition. Successful exploitation allows remote authenticated users to affect confidentiality, integrity and availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to DML. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Oracle MySQL 5.6.x through 5.6.22 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Server : InnoDB. Successful exploitation allows remote authenticated users to affect availability.
The host is installed with Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1 or Windows 7 SP1 and is prone to an elevation of privilege vulnerability. A flaw is present in the application, which fails to properly check the length of a buffer prior to copying memory into it. Successful exploitation allows attackers to gain elevated privileges on a targeted system.