Page 10 of 60 results (0.004 seconds)

CVSS: 6.8EPSS: 2%CPEs: 24EXPL: 0

Stack-based buffer overflow in JDBC Applet Server in IBM DB2 8.1 allows remote attackers to execute arbitrary by connecting and sending a long username, then disconnecting gracefully and reconnecting and sending a short username and an unexpected db2java.zip version, which causes a null terminator to be removed and leads to the overflow. • http://marc.info/?l=bugtraq&m=110495251101381&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg1IY61492 http://www.nextgenss.com/advisories/db205012005D.txt http://www.securityfocus.com/bid/11401 https://exchange.xforce.ibmcloud.com/vulnerabilities/17613 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 2%CPEs: 1EXPL: 0

Stack-based buffer overflows in the (1) xmlvarcharfromfile, (2) xmlclobfromfile, (3) xmlfilefromvarchar, and (4) xmlfilefromclob function calls in IBM DB2 8.1 allow remote attackers to execute arbitrary code via a 94-byte second argument, which causes the return address to be overwritten with a pointer to the argument. • http://marc.info/?l=bugtraq&m=110495554227717&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg1IY62297 http://www.nextgenss.com/advisories/db205012005H.txt http://www.securityfocus.com/bid/11404 https://exchange.xforce.ibmcloud.com/vulnerabilities/17617 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile. • http://marc.info/?l=bugtraq&m=110495620513954&w=2 http://secunia.com/advisories/12733 http://www.ngssoftware.com/advisories/db205012005I.txt http://www.securityfocus.com/bid/12170 https://exchange.xforce.ibmcloud.com/vulnerabilities/18761 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 2%CPEs: 12EXPL: 3

IBM DB2 Universal Database (UDB) 810 before 8.1 FP10 allows remote authenticated users to cause a denial of service (application crash) via (1) certain equality predicates that trigger self-removal, aka IY70808; and (2) a query with more than 32000 elements in the IN-list, aka LI70817. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY70808 http://www-1.ibm.com/support/docview.wss?uid=swg1LI70817 http://www.securityfocus.com/bid/15126 •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 2

IBM DB2 Universal Database (UDB) 820 before 8.2 FP10 allows remote authenticated users to cause a denial of service (disk consumption) via a hash join (hsjn) that triggers an infinite loop in sqlri_hsjnFlushBlocks. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY70561 http://www.securityfocus.com/bid/15126 •