Download
| Alert*
oval:org.secpod.oval:def:20680
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB storage engine. Successful exploitation allows remote authenticated users to cause a denial of service (assertion fai ... oval:org.mitre.oval:def:7544 sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure. oval:org.secpod.oval:def:5565 The host is installed with 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect availability. oval:org.secpod.oval:def:10640 The host is installed with MySQL 5.1.x before 5.1.68 or 5.5.x before 5.5.30 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allo ... oval:org.secpod.oval:def:10641 The host is installed with MySQL 5.1.x before 5.1.68 or 5.5.x before 5.5.28 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly bounds-check user-supplied data before copying it into an insufficiently sized buffer. Successful exploitation allo ... oval:org.secpod.oval:def:201740 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the MySQL PolyFromWKB function did not sanity check Well-Known Binary data. A remote, authenticated attacker could use specially-crafted WKB d ... oval:org.secpod.oval:def:201737 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the MySQL PolyFromWKB function did not sanity check Well-Known Binary data. A remote, authenticated attacker could use specially-crafted WKB d ... oval:org.secpod.oval:def:5564 The host is installed with 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Partition. Successful exploitation could allow remote authenticated users to affect availability. oval:org.secpod.oval:def:7295 The host is installed with Oracle MySQL 5.1.x through 5.1.62 or 5.5.x through 5.5.22 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect ... oval:org.secpod.oval:def:7293 The host is installed with Oracle MySQL 5.1.x through 5.1.62 or 5.5.x through 5.5.23 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect ... oval:org.secpod.oval:def:7294 The host is installed with Oracle MySQL 5.1.x through 5.1.62 or 5.5.x through 5.5.23 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to GIS Extension. Successful exploitation allows remote authenticated users to affect availabili ... oval:org.secpod.oval:def:14861 The host is installed with Oracle MySQL 5.1.69 or earlier, 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect av ... oval:org.secpod.oval:def:14862 The host is installed with Oracle MySQL 5.1.69 or earlier, 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Full Text Search. Successful exploitation allows attackers to affect av ... oval:org.secpod.oval:def:14857 The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Options. Successful exploitation allows attackers to affect availability. oval:org.secpod.oval:def:1500163 Updated mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are availabl ... oval:org.secpod.oval:def:7486 The host is installed with Oracle MySQL 5.0.x before 5.0.93 or 5.1.x before 5.1.50 and is prone to SQL injection vulnerability. A flaw is present in the application, which fails to handle the slave configurations in which the slave is running a newer version than the master. Successful exploitation ... oval:org.secpod.oval:def:7485 The host is installed with Oracle MySQL 5.1.x before 5.1.62 or 5.5.x before 5.5.22 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle HANDLER READ NEXT command. Successful exploitation allows an assertion failure and mysqld abort. oval:org.mitre.oval:def:11869 MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service (server crash and database loss) via an ALTER DATABASE command with a #mysql50# string followed by a . (dot), .. (dot dot), ../ (dot dot slash) or similar sequence, and an UPGRADE DATA D ... oval:org.secpod.oval:def:8244 The host is installed with MySQL 5.5.x before 5.5.22 or 5.1.x before 5.1.62 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle yaSSL. Successful exploitation allows remote attackers to execute arbitrary code. oval:org.secpod.oval:def:202250 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:500834 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide ... oval:org.secpod.oval:def:202383 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A flaw was found in the way MySQL processed HANDLER READ NEXT statements after deleting a record. A remote, authenticated attacker could use this flaw to provide ... oval:org.secpod.oval:def:10870 The host is installed with Oracle MySQL 5.5.29 or earlier, 5.1.67 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows attackers to affect availability. oval:org.secpod.oval:def:10863 The host is installed with Oracle MySQL 5.1.63 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Types. Successful exploitation allows attackers to affect availability. oval:org.secpod.oval:def:501051 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory pa ... oval:org.secpod.oval:def:10850 The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Install. Successful exploitation allows attackers to affect confidentiali ... oval:org.secpod.oval:def:10849 The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect availabilit ... oval:org.secpod.oval:def:10860 The host is installed with Oracle MySQL 5.1.67 or earlier or 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Partition. Successful exploitation allows attackers to affect availability. oval:org.secpod.oval:def:10861 The host is installed with Oracle MySQL 5.1.67 or earlier or 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation allows attackers to affect confidentiality, integrity and availability. oval:org.secpod.oval:def:10851 The host is installed with Oracle MySQL 5.5.29 or earlier or 5.1.67 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows attackers to affect availability. oval:org.secpod.oval:def:10852 The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability. oval:org.secpod.oval:def:10854 The host is installed with Oracle MySQL 5.1.67 or earlier, 5.5.29 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows attackers to affect confident ... oval:org.secpod.oval:def:202875 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:4001 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:4002 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:4000 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:4005 The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial integrity impact. Successful exploitation allows remote attackers to cause a denial ... oval:org.secpod.oval:def:4003 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:4004 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:500334 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was found that the MySQL PolyFromWKB function did not sanity check Well-Known Binary data. A remote, authenticated attacker could use specially-crafted WKB d ... oval:org.secpod.oval:def:5563 The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect avai ... oval:org.secpod.oval:def:5568 The host is installed with MySQL 5.1.60 or earlier or 5.5.19 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availabili ... oval:org.secpod.oval:def:5567 The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server DML. Successful exploitation could allow remote authenticated users to affect availabili ... oval:org.secpod.oval:def:5566 The host is installed with MySQL 5.1.61 or earlier or 5.5.21 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors related to Server Optimizer. Successful exploitation could allow remote authenticated users to affect avai ... oval:org.secpod.oval:def:20683 The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers an access of uninitialized memory. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon cra ... oval:org.secpod.oval:def:20684 The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of ... oval:org.secpod.oval:def:20681 The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a join query that uses a table with a unique SET column. Successful exploitation allows remote authenti ... oval:org.secpod.oval:def:201942 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was discovered that the MySQL client ignored certain SSL certificate verification errors when connecting to servers. A man-in-the-middle attacker could use th ... oval:org.secpod.oval:def:20682 The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Successful exploitation all ... oval:org.secpod.oval:def:201852 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was discovered that the MySQL client ignored certain SSL certificate verification errors when connecting to servers. A man-in-the-middle attacker could use th ... oval:org.secpod.oval:def:20689 The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle vectors related to "materializing a derived table that required a temporary table for group ... oval:org.secpod.oval:def:20687 The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation allows remote authenticated users to cause a denial of servic ... oval:org.secpod.oval:def:20688 The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly propagate type errors. Successful exploitation allows remote authenticated users to cause a ... oval:org.secpod.oval:def:20685 The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform alternate reads from two indexes on a table, which triggers an assertion failure. Successful exploitati ... oval:org.secpod.oval:def:20686 The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function. Successful exploitation allows remote authe ... oval:org.mitre.oval:def:8510 The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate ... oval:org.secpod.oval:def:500741 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:20694 The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handle a query with nested JOIN statements. Successful exploitation allows remote authenticated users to cause a ... oval:org.secpod.oval:def:20695 The host is installed with Oracle MySQL 5.1 before 5.1.51 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted number of (1) line strings or (2) line points. Successful exploitation allows remote authenticated users to cause ... oval:org.secpod.oval:def:20692 The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modi ... oval:org.secpod.oval:def:20693 The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handled when the function's result is "processed using an intermediate temporary table.". Succ ... oval:org.secpod.oval:def:20690 The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which causes the expression to be re-evaluated instead of accessing its value from the table. Successful exploitation allows remote aut ... oval:org.secpod.oval:def:20691 The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimi ... oval:org.secpod.oval:def:3990 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:3991 The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality impact. Successful exploitation allows remote attackers to cause a ... oval:org.secpod.oval:def:3994 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and availability impact. Successful exploitation allows remote attackers to cause a denial ... oval:org.secpod.oval:def:3992 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:3993 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:3998 The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and integrity impact. Successful exploitation allows remote attacke ... oval:org.secpod.oval:def:3999 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and availability impact. Successful exploitation allows remote attackers to cause a denial ... oval:org.secpod.oval:def:3996 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial confidentiality and integrity impact. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:3997 The host is installed with Oracle MySQL 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:500482 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. It was discovered that the MySQL client ignored certain SSL certificate verification errors when connecting to servers. A man-in-the-middle attacker could use th ... oval:org.secpod.oval:def:3983 The host is installed with Oracle MySQL 5.1.x before 5.5.61 or 5.5.x before 5.5.20 and is prone unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a denial of service. oval:org.secpod.oval:def:3985 The host is installed with Oracle MySQL 5.0.x before 5.0.95 or 5.1.x before 5.1.61 or 5.5.x before 5.5.20 and is prone to an unspecified vulnerability. A flaw is present in the application, which results in a partial availability impact. Successful exploitation allows remote attackers to cause a den ... oval:org.secpod.oval:def:500146 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. The MySQL PolyFromWKB function did not sanity check Well-Known Binary data, which could allow a remote, authenticated attacker to crash mysqld. A flaw in the w ... oval:org.secpod.oval:def:16596 The host is installed with Oracle MySQL 5.1.x through 5.1.71, 5.5.x through 5.5.33 or 5.6.x through 5.6.13 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to InnoDB. Successful exploitation allows remote authenti ... oval:org.secpod.oval:def:16597 The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Optimizer. Successful exploitation allows remote authe ... oval:org.secpod.oval:def:16591 The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Error Handling. Successful exploitation allows remote attacker ... oval:org.secpod.oval:def:16594 The host is installed with Oracle MySQL 5.1.x through 5.1.71, 5.5.x through 5.5.33 or 5.6.x through 5.6.13 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to Locking. Successful exploitation allows remote authent ... oval:org.secpod.oval:def:16595 The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors. Successful exploitation allows remote authenticated users to aff ... oval:org.secpod.oval:def:16593 The host is installed with Oracle MySQL 5.1.x through 5.1.71, 5.5.x through 5.5.33 or 5.6.x through 5.6.13 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Error Handling. Successful exploitation allows remote attacker ... oval:org.secpod.oval:def:501185 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:16602 The host is installed with Oracle MySQL 5.1.x through 5.1.72, 5.5.x through 5.5.34 or 5.6.x through 5.6.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to InnoDB. Successful exploitation allows remote authenti ... oval:org.secpod.oval:def:601197 This DSA updates the MySQL 5.1 database to 5.1.73 oval:org.secpod.oval:def:203028 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:1500387 Updated mysql packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, a ... oval:org.secpod.oval:def:202540 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:8943 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows remote authenticated users to affect availability. oval:org.secpod.oval:def:8944 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows remote authenticated users to affect availability. oval:org.secpod.oval:def:8940 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availab ... oval:org.secpod.oval:def:8941 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle certain unknown vectors. Successful exploitation allows remote attackers to affect availability. oval:org.secpod.oval:def:202531 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysql ... oval:org.secpod.oval:def:8929 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availab ... oval:org.secpod.oval:def:1500086 Updated mysql packages that fix several security issues are now availablefor Red Hat Enterprise Linux 6.The Red Hat Security Response Team has rated this update as having moderatesecurity impact. Common Vulnerability Scoring System base scores,which give detailed severity ratings, are available for ... oval:org.secpod.oval:def:8931 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows local users to affect confidentiality and ... oval:org.secpod.oval:def:8932 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows remote authenticated users to affect avail ... oval:org.secpod.oval:def:8933 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Locking. Successful exploitation allows remote attackers to affect availability. oval:org.secpod.oval:def:8934 The host is installed with Oracle MySQL 5.1.x through 5.1.66 or 5.5.x through 5.5.28 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect confi ... oval:org.secpod.oval:def:8939 The host is installed with Oracle MySQL 5.1.x through 5.1.65 or 5.5.x through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to GIS Extension. Successful exploitation allows remote authenticated users to affect availabili ... oval:org.secpod.oval:def:7479 The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availability. oval:org.secpod.oval:def:7475 The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Information Schema. Successful exploitation allows remote authenticated users to affect confidential ... oval:org.secpod.oval:def:7476 The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Installation. Successful exploitation allows local users to affect confidentiality. oval:org.secpod.oval:def:7477 The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Protocol. Successful exploitation allows remote attackers to affect confidentiality, integrity, and ... oval:org.secpod.oval:def:501368 Updated mysql packages that fix several bugs are now available for Red Hat Enterprise Linux 6. MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes the following bugs: * Prior to this update, the ... oval:org.secpod.oval:def:500953 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. A stack-based buffer overflow flaw was found in the user permission checking code in MySQL. An authenticated database user could use this flaw to crash the mysql ... oval:org.secpod.oval:def:7471 The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server. Successful exploitation allows remote authenticated users to affect availability. oval:org.secpod.oval:def:7472 The host is installed with MySQL 5.1.0 through 5.1.63 InnoDB Plugin. or 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB Plugin. Successful exploitation allows remote authenticated users to affect av ... oval:org.secpod.oval:def:7473 The host is installed with MySQL 5.1.0 through 5.1.63 or 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Full Text Search. Successful exploitation allows remote authenticated users to affect availab ... oval:org.secpod.oval:def:7474 The host is installed with MySQL 5.1.0 through 5.1.63 or 5.5.0 through 5.5.25 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows remote authenticated users to affect availability. oval:org.secpod.oval:def:500958 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:7470 The host is installed with MySQL 5.1.0 through 5.1.65 or 5.5.0 through 5.5.27 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availability. oval:org.secpod.oval:def:7484 The host is installed with Oracle MySQL 5.1.x before 5.1.63 or 5.5.x before 5.5.24 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to incorrect calculation and a sort order index. Successful exploitation allows remote authe ... oval:org.secpod.oval:def:202491 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:7469 The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows remote authenticated users to affect availability ... oval:org.secpod.oval:def:1500071 Updated mysql packages that fix two security issues are now available forRed Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System basescores, which give detailed severity ratings, are available for ... oval:org.secpod.oval:def:500925 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... oval:org.secpod.oval:def:500739 MySQL is a multi-user, multi-threaded SQL database server. It consists of the MySQL server daemon and many client programs and libraries. This update fixes several vulnerabilities in the MySQL database server. Information about these flaws can be found on the Oracle Critical Patch Update Advisory p ... |