Vulnerability & Exploit Database

Displaying entries 1 - 10 of 26 in total

Results for: CVE-2018-3081 Back to search

SUSE: CVE-2018-14567: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: August 14, 2018

libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.

SUSE: CVE-2018-14404: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: July 19, 2018

A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due...

Ubuntu: (Multiple Advisories) (CVE-2018-3081): MySQL vulnerabilities Vulnerability

  • Severity: 5
  • Published: July 18, 2018

Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL ...

SUSE: CVE-2018-3081: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: July 18, 2018

Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL ...

Oracle Solaris 11: CVE-2018-3081: Vulnerability in MySQL Vulnerability

  • Severity: 5
  • Published: July 18, 2018

Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL ...

Oracle MySQL Vulnerability: CVE-2018-3081 Vulnerability

  • Severity: 5
  • Published: July 18, 2018

Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL ...

Debian: CVE-2018-3081: mariadb-10.0, mariadb-10.1, mysql-5.5 -- security update Vulnerability

  • Severity: 5
  • Published: July 18, 2018

Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL ...

Amazon Linux AMI: CVE-2018-3081: Security patch for mysql57 ((Multiple Advisories)) Vulnerability

  • Severity: 5
  • Published: July 18, 2018

Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL ...

SUSE: CVE-2017-18258: SUSE Linux Security Advisory Vulnerability

  • Severity: 4
  • Published: April 08, 2018

The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.