[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 31600 Download | Alert*

The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related to view preparation, pre-evaluation of LIKE predicates, and IN Optimizers. Successful exploitation allows remote authenticated users to cause a denial of service (assert ...

The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle vectors related a prepared statement that uses GROUP_CONCAT with the WITH ROLLUP modifier. Successful exploitation allows remote authenticated users to cause a denial of service (server ...

The host is installed with Oracle MySQL 5.0 before 5.0.92, 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handled when the function's result is "processed using an intermediate temporary table.". Successful exploitation allows remote authenticated users to cause a denial of service (server crash).

The host is installed with Oracle MySQL 5.1 before 5.1.51 or 5.5 before 5.5.6 and is prone to denial of service vulnerability. A flaw is present in the application, which is not properly handle a query with nested JOIN statements. Successful exploitation allows remote authenticated users to cause a denial of service (infinite loop).

The host is installed with Oracle MySQL 5.1 before 5.1.51 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted number of (1) line strings or (2) line points. Successful exploitation allows remote authenticated users to cause a denial of service (server crash).

The host is installed with Wireshark 1.4.x before 1.4.8 or 1.6.x before 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to handle an invalid packet. Successful exploitation could allow attackers to crash the application.

The host is installed with Oracle Java SE before 7 Update 11 and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle unknown vectors. Successful exploitation could allow attackers to execute arbitrary code.

The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, or 1.4.2_40 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to 2D. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, or 1.4.2_40 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.

The host is installed with Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38 or earlier and is prone to an unspecified vulnerability. A flaw is present in the application, which fails to handle vectors related to AWT. Successful exploitation could allow attackers to affect confidentiality, integrity, and availability.


Pages:      Start    1592    1593    1594    1595    1596    1597    1598    1599    1600    1601    1602    1603    1604    1605    ..   3159

© SecPod Technologies