The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a join query that uses a table with a unique SET column. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier. Successful exploitation allows remote authenticated users to cause a denial of service (crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers an access of uninitialized memory. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle InnoDB, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly perform alternate reads from two indexes on a table, which triggers an assertion failure. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.0 before 5.0.92 and is prone to denial of service vulnerability. A flaw is present in the application, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.1 before 5.1.49 or 5.5 before 5.5.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted request. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld daemon crash).
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly propagate type errors. Successful exploitation allows remote authenticated users to cause a denial of service (server crash).
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to unspecified vulnerability. A flaw is present in the application, which does not properly handle vectors related to "materializing a derived table that required a temporary table for grouping" and "user variable assignments.". Successful exploitation allows remote authenticated users to ...
The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which causes the expression to be re-evaluated instead of accessing its value from the table. Successful exploitation allows remote authenticated users to cause a denial of service (mysqld server crash).