Page 18 of 89 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 58EXPL: 0

IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user with DB2 instance owner privileges to obtain root access. IBM X-Force ID: 128178. IBM DB2 para Linux, UNIX y Windows 9.7, 10,1, 10.5 y 11.1 (incluido DB2 Connect Server) podría permitir a un usuario local con privilegios de propietario en la instancia DB2 obtener acceso root. IBM X-Force ID: 128178. • http://www.ibm.com/support/docview.wss?uid=swg22006061 http://www.securityfocus.com/bid/100690 http://www.securitytracker.com/id/1039301 https://exchange.xforce.ibmcloud.com/vulnerabilities/128178 •

CVSS: 7.8EPSS: 0%CPEs: 58EXPL: 0

IBM DB2 for Linux, UNIX and Windows 9.7, 10,1, 10.5, and 11.1 (includes DB2 Connect Server) could allow a local user to obtain elevated privilege and overwrite DB2 files. IBM X-Force ID: 128180. IBM DB2 para Linux, UNIX y Windows 9.7, 10,1, 10.5 y 11.1 (incluido DB2 Connect Server) podría permitir a un usuario local obtener privilegios elevados y sobrescribir archivos DB2.. IBM X-Force ID: 128180. • http://www.ibm.com/support/docview.wss?uid=swg22006109 http://www.securityfocus.com/bid/100698 http://www.securitytracker.com/id/1039299 https://exchange.xforce.ibmcloud.com/vulnerabilities/128180 •

CVSS: 5.9EPSS: 0%CPEs: 21EXPL: 0

IBM DB2 10.5 and 11.1 contains a denial of service vulnerability. A remote user can cause disruption of service for DB2 Connect Server setup with a particular configuration. IBM X-Force ID: 129829. IBM DB2 10.5 y 11.1 es vulnerable a denegaciones de servicio. Un usuario remoto puede provocar la interrupción del servicio en la instalación de DB2 Connect Server con una configuración específica. • http://www.ibm.com/support/docview.wss?uid=swg22007183 http://www.securityfocus.com/bid/100688 http://www.securitytracker.com/id/1039298 https://exchange.xforce.ibmcloud.com/vulnerabilities/129829 • CWE-20: Improper Input Validation •

CVSS: 7.3EPSS: 0%CPEs: 246EXPL: 0

Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program. Vulnerabilidad de ruta de búsqueda no confiable en IBM DB2 9.7 hasta la versión FP11, 10.1 hasta la versión FP5, 10.5 en versiones anteriores a FP8 y 11.1 GA en Linux, AIX y HP-UX permite a usuarios locales obtener privilegios a través de una librería troyanizada a la que se accede mediante un programa setuid o setgid. • http://www-01.ibm.com/support/docview.wss?uid=swg1IT16921 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17010 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17011 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17012 http://www-01.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •