Page 10 of 51 results (0.010 seconds)

CVSS: 6.5EPSS: 3%CPEs: 11EXPL: 0

Multiple buffer overflows in IBM Informix Dynamic Server (IDS) before 9.40.TC6 and 10.00 before 10.00.TC3 allow remote authenticated users to execute arbitrary code via (1) the getname function, as used by (a) _sq_remview, (b) _sq_remproc, (c) _sq_remperms, (d) _sq_distfetch, and (e) _sq_dcatalog; and the (2) SET DEBUG FILE, (3) IFX_FILE_TO_FILE, (4) FILETOCLOB, (5) LOTOFILE, and (6) DBINFO functions (product defect IDs 171649, 171367, 171387, 171391, 171906, 172179). Múltiples desbordamientos de búfer en IBMInformix Dynamic Server (IDS) anterior a 9.40.TC6 y 10.00 anterior a 10.00.TC3 permite a usuarios autenticados remotamente ejecutar código de su elección mediante la función (1) getname, tal y como se usa en (a) _sq_remview, (b) _sq_remproc, (c) _sq_remperms, (d) _sq_distfetch, y (e) _sq_dcatalog; y las funciones (2) SET DEBUG FILE, (3) IFX_FILE_TO_FILE, (4) FILETOCLOB, (5) LOTOFILE, y (6) DBINFO (identificadores de defectos de producto 171649, 171367, 171387, 171391, 171906, 172179). • http://secunia.com/advisories/21301 http://www-1.ibm.com/support/docview.wss?uid=swg21242921 http://www.databasesecurity.com/informix/DatabaseHackersHandbook-AttackingInformix.pdf http://www.osvdb.org/27681 http://www.osvdb.org/27682 http://www.osvdb.org/27683 http://www.osvdb.org/27687 http://www.osvdb.org/27688 http://www.osvdb.org/27693 http://www.securityfocus.com/archive/1/443133/100/0/threaded http://www.securityfocus.com/archive/1/443210/100/0/threaded http:& •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

IBM Informix Dynamic Database server running on Windows XP with Simple File Sharing enabled, allows remote attackers to bypass authentication and log on to the guest account by supplying an invalid username. • http://www.ngssoftware.com/papers/database-on-xp.pdf http://www.securityfocus.com/bid/15451 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in IBM Informix Dynamic Server (IDS) 9.40.xC1 and 9.40.xC2 allows local users to execute arbitrary code via a long GL_PATH environment variable. • http://marc.info/?l=bugtraq&m=107524391217364&w=2 http://secunia.com/advisories/10737 http://www-1.ibm.com/support/docview.wss?uid=swg21153336 http://www.osvdb.org/3756 http://www.securityfocus.com/bid/9511 https://exchange.xforce.ibmcloud.com/vulnerabilities/14949 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Format string vulnerability in IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to execute arbitrary code via a modified INFORMIXDIR environment variable that points to a file with format string specifiers in the filename. • http://marc.info/?l=bugtraq&m=107524391217364&w=2 http://secunia.com/advisories/10737 http://www-1.ibm.com/support/docview.wss?uid=swg21153336 http://www.osvdb.org/3757 http://www.securityfocus.com/bid/9511 https://exchange.xforce.ibmcloud.com/vulnerabilities/14967 •

CVSS: 3.6EPSS: 0%CPEs: 4EXPL: 2

IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to (1) create or overwrite files via the /001 log file to onedcu or (2) read arbitrary files via a symlink attack on a file in /tmp to onshowaudit. • http://secunia.com/advisories/10737 http://www-1.ibm.com/support/docview.wss?uid=swg21153336 http://www.osvdb.org/3758 http://www.osvdb.org/3760 http://www.securityfocus.com/archive/1/351770 http://www.securityfocus.com/bid/9511 http://www.securityfocus.com/bid/9512 https://exchange.xforce.ibmcloud.com/vulnerabilities/14969 https://exchange.xforce.ibmcloud.com/vulnerabilities/14971 •