[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31456 Download | Alert*

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to CLIENT:SSL:yaSSL. Successful exploitation allows remote attackers to affect availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to CLIENT:MYSQLDUMP. Successful exploitation allows remote authenticated users to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.38 or MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to CLIENT:MYSQLADMIN. Successful exploitation allows local users to affect confidentiality.

The host is installed with Oracle MySQL 5.5.x through 5.5.39 or MySQL 5.6.x through 5.6.20 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to SERVER:DML. Successful exploitation allows remote authenticated users to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.5.x through 5.5.39 or MySQL 5.6.x through 5.6.20 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to C API SSL CERTIFICATE HANDLING. Successful exploitation allows remote attackers to affect confidentiality.

The host is installed with Oracle MySQL 5.6.x through 5.6.19 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle unknown vectors related to SERVER:INNODB FULLTEXT SEARCH DML. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to a (1) zero-length quantifier or (2) look-behind expression. Successful exploitation could allow attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact.

The host is installed with Google Chrome before 40.0.2214.91 and is prone to a denial of service vulnerability. A flaw is present in the application, which does not initialize memory for a data structure. Successful exploitation could allow attackers to cause a denial of service or possibly have unspecified other impact.

MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home ...

mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.


Pages:      Start    1546    1547    1548    1549    1550    1551    1552    1553    1554    1555    1556    1557    1558    1559    ..   3145

© SecPod Technologies