Page 18 of 88 results (0.004 seconds)

CVSS: 7.1EPSS: 0%CPEs: 38EXPL: 0

IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a buffer overflow that could allow a local user to overwrite DB2 files or cause a denial of service. IBM X-Force ID: 120668. IBM DB2 para Linux, UNIX y Windows 9.2, 10,1, 10.5 y 11.1 (incluido DB2 Connect Server) es vulnerable a un desbordamiento de búfer que podría permitir que un usuario local sobrescriba archivos DB2 o provoque una denegación de servicio (DoS). IBM X-Force ID: 120668. • http://www.ibm.com/support/docview.wss?uid=swg22003877 http://www.securityfocus.com/bid/99264 http://www.securitytracker.com/id/1038773 https://exchange.xforce.ibmcloud.com/vulnerabilities/120668 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.3EPSS: 0%CPEs: 38EXPL: 1

IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code. IBM X-Force ID: 125159. IBM DB2 para Linux, Unix y Windows 9.2, 10.1, 10.5 y 11.1 (incluido DB2 Connect Server) es vulnerable a un buffer overflow basado en pila --stack-- causado por una inapropiada verificación de límites lo que podría permitir a un atacante local ejecutar código aleatorio. IBM DB2 versions 9.7, 10.1, 10.5, and 11.1 suffer from a command line process buffer overflow vulnerability. • https://www.exploit-db.com/exploits/42260 http://www.ibm.com/support/docview.wss?uid=swg22004878 http://www.securityfocus.com/bid/99271 http://www.securitytracker.com/id/1038772 https://exchange.xforce.ibmcloud.com/vulnerabilities/125159 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.3EPSS: 0%CPEs: 246EXPL: 0

Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program. Vulnerabilidad de ruta de búsqueda no confiable en IBM DB2 9.7 hasta la versión FP11, 10.1 hasta la versión FP5, 10.5 en versiones anteriores a FP8 y 11.1 GA en Linux, AIX y HP-UX permite a usuarios locales obtener privilegios a través de una librería troyanizada a la que se accede mediante un programa setuid o setgid. • http://www-01.ibm.com/support/docview.wss?uid=swg1IT16921 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17010 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17011 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17012 http://www-01.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •