The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers. Successful exploitation allows remote authenticated users to cause a denial of service (assert ...
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier. Successful exploitation allows remote authenticated users to cause a denial of service (server ...
The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handled when the function's result is "processed using an intermediate temporary table.". Successful exploitation allows remote authenticated users to cause a denial of service (server crash).
The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handle a query with nested JOIN statements. Successful exploitation allows remote authenticated users to cause a denial of service (infinite loop).
The host is installed with Oracle MySQL 5.1 before 5.1.51 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted number of (1) line strings or (2) line points. Successful exploitation allows remote authenticated users to cause a denial of service (server crash).
The host is installed with Wireshark 1.4.x before 1.4.8 or 1.6.x before 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to handle an invalid packet. Successful exploitation could allow attackers to crash the application.
The host is installed with Oracle Java SE before 7 Update 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.
The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, or 1.4.2_40 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, or 1.4.2_40 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.
The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.