[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114154

 
 

909

 
 

88671

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12053 Download | Alert*

The host is installed with Novell iPrint Client before 5.90 and is prone to stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to handle specially crafted data. Successful exploitation allows attackers to execute arbitrary code.

The host is installed with BitZipper 2013 before Update 1 and is prone to memory corruption vulnerability. A flaw is present in the application, whicb fails to handle a crafted ZIP archive. Successful exploitation allows attackers to execute arbitrary code or cause a denial of service.

The host is installed with Oracle MySQL 5.5.30 or earlier or 5.6.9 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Partition. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.30 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Data Manipulation Language. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.29 or earlier or 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect confidentiality, integrity and availability.

The host is installed with Oracle MySQL 5.5.29 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Replication. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Data Manipulation Language. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Impeached. Successful exploitation allows attackers to affect availability.


Pages:      Start    1042    1043    1044    1045    1046    1047    1048    1049    1050    1051    1052    1053    1054    1055    ..   1205

© SecPod Technologies