[Forgot Password]
Login  Register Subscribe

24003

 
 

131425

 
 

103942

 
 

909

 
 

84057

 
 

133

 
 
Paid content will be excluded from the download.

Filter
Matches : 12103 Download | Alert*

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Privileges. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle MySQL 5.1.68 or earlier, 5.5.30 or earlier or 5.6.10 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Options. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Audit Log. Successful exploitation allows attackers to affect integrity.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to XA Transactions. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to InnoDB. Successful exploitation allows attackers to affect availability.

The host is installed with Oracle MySQL 5.5.31 or earlier or 5.6.11 or earlier and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle vectors related to Server Replication. Successful exploitation allows attackers to affect availability.

The host is installed with Microsoft Windows Vista, Server 2008, Windows 7, Windows 8, Windows Server 2012 or Windows Server 2008 R2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory for incoming ICMPv6 packets. Successful exploitation could allow attackers to crash the service.

The host is installed with Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 or Windows 8 and is prone to elevation of privilege vulnerability. The flaw is present in the Windows kernel, which fails to handle memory corruption condition in the NT Virtual DOS Machine (NTVDM). Successful exploitation could allow attackers to run arbitrary code in kernel mode.

The host is installed with Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 or Windows 8 and is prone to elevation of privilege vulnerability. The flaw is present in the Windows kernel, which fails to handle memory corruption condition in the NT Virtual DOS Machine (NTVDM). Successful exploitation could allow attackers to run arbitrary code in kernel mode.


Pages:      Start    4    5    6    7    8    9    10    11    12    13    14    15    16    17    ..   1210

© 2013 SecPod Technologies