[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 26884 Download | Alert*

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to DML. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.24 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : I_S. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Security : Privileges. Successful exploitation allows remote authenticated users to affect confidentiality.

The host is installed with Oracle MySQL 5.5.x through 5.5.43 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Pluggable Auth. Successful exploitation allows remote authenticated users to affect confidentiality.

The host is installed with Oracle MySQL 5.5.x through 5.5.42 or MySQL 5.6.x through 5.6.23 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server : Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with OpenSSH before 7.1p2 and is prone to denial of service vulnerability. A flaw is present in ssh_packet_read_poll2 function in packet.c in the client, which fails to validate the pathnames passed to its functions. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted network traffic.

The host is installed with Oracle VM VirtualBox from 4.3.x before 4.3.36 or 5.0.x and before 5.0.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to core. Successful exploitation could allows local users to affect availability

The host is installed with Oracle VM VirtualBox from 4.3.x before 4.3.36 or 5.0.x and before 5.0.14 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to core. Successful exploitation could allows local users to affect availability

The host is installed with OpenSSL 1.0.1 before 1.0.1r or 1.0.2 before 1.0.2f and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle SSL_OP_SINGLE_DH_USE option. Successful exploitation allows remote attackers to crash the service or lower the performance.

The host is installed with OpenSSH before 7.2p2 and is prone to multiple CRLF injection vulnerabilities. The flaws are present in session.c in sshd, which fails to handle crafted X11 forwarding data, related to the (1) do_authenticated1 and (2) session_x11_req functions. Successful exploitation could allow remote authenticated users to bypass intended shell-command restrictions.


Pages:      Start    1270    1271    1272    1273    1274    1275    1276    1277    1278    1279    1280    1281    1282    1283    ..   2688

© SecPod Technologies