[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15028 Download | Alert*

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Data Manipulation Language. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Impeached. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Privileges. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle MySQL 5.6.10 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Data Manipulation Language. Successful exploitation allows attackers to affect availability.

sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.

The host is installed with the VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to a privilege escalation vulnerability. The application fails to properly handle the COM classes used by the VMX process. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, le ...

The host is installed with the VMware Workstation 14.x before 14.1.6, 15.x before 15.0.3 or VMware Player 14.x before 14.1.6, 15.x before 15.0.3 and is prone to a privilege escalation vulnerability. The application fails to properly handle the path to the VMX executable, on a Windows host. Successful exploitation of this issue may allow the path to the VMX executable, on a Windows host, to be hija ...

The host is installed with the VMware Workstation 14.x before 14.1.1 or VMware Player 14.x before 14.1.1 and is prone to a denial of service vulnerability . A flaw is present in the application, which can be triggered by opening a large number of VNC sessions. Successful exploitation could result in denial of service.

The host is installed with VMware Workstation 10.x before 10.0.5 or VMware Player 6.x before 6.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to cause a host OS denial of service.


Pages:      Start    1371    1372    1373    1374    1375    1376    1377    1378    1379    1380    1381    1382    1383    1384    ..   1502

© SecPod Technologies