[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

114411

 
 

909

 
 

88812

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 12811 Download | Alert*

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Impeached. Successful exploitation allows attackers to affect integrity and availability.

The host is installed with Oracle MySQL 5.5.30 or earlier or 5.6.10 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Options. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.1.69 or earlier, 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Full Text Search. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.1.69 or earlier, 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Optimizer. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.30 or earlier or 5.6.10 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Prepared Statements. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Privileges. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Options. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Audit Log. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to XA Transactions. Successful exploitation allows attackers to affect availability.


Pages:      Start    1084    1085    1086    1087    1088    1089    1090    1091    1092    1093    1094    1095    1096    1097    ..   1281

© SecPod Technologies