[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 15162 Download | Alert*

The host is installed with MySQL 5.1.0 through 5.1.64 or 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to Server Optimizer. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Google Chrome before 4.0.249.89 and is prone to bypass vulnerability. A flaw is present in the application which does not properly handle mouse click event. Successful exploitation allow remote attackers to bypass intended restrictions on popup windows.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to MySQL Client. Successful exploitation allows remote authenticated users to affect confidentiality.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to MySQL Client. Successful exploitation allows remote authenticated users to affect integrity and availability.

The host is installed with MySQL 5.5.0 through 5.5.26 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to server. Successful exploitation allows remote authenticated users to affect availability.

The host is installed with Oracle MySQL 5.5.x before 5.5.23 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to a Security Fix. Successful exploitation allows disruption of service.

The host is installed with Oracle MySQL 5.1.x before 5.1.62 or 5.5.x before 5.5.22 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle HANDLER READ NEXT command. Successful exploitation allows an assertion failure and mysqld abort.

The host is installed with Oracle MySQL 5.0.x before 5.0.93 or 5.1.x before 5.1.50 and is prone to SQL injection vulnerability. A flaw is present in the application, which fails to handle the slave configurations in which the slave is running a newer version than the master. Successful exploitation allows remote attackers to execute arbitrary SQL commands.

The host is installed with VMware Movie Decoder before 9.0 and is prone to untrusted search path vulnerability. A flaw is present in the application, which fails to handle the installer. Successful exploitation allows local users to gain privileges via a trojan horse executable file in the installer directory.

The host is installed with WellinTech KingView 6.5.3 (65.30.2003.17377) or earlier and is prone to information disclosure vulnerability. A flaw is present in the application, which uses a weak password-hashing algorithm. Successful exploitation allows local users to discover credentials by reading an unspecified file.


Pages:      Start    1266    1267    1268    1269    1270    1271    1272    1273    1274    1275    1276    1277    1278    1279    ..   1516

© SecPod Technologies