Page 19 of 96 results (0.004 seconds)

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 0

Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile. • http://marc.info/?l=bugtraq&m=110495620513954&w=2 http://secunia.com/advisories/12733 http://www.ngssoftware.com/advisories/db205012005I.txt http://www.securityfocus.com/bid/12170 https://exchange.xforce.ibmcloud.com/vulnerabilities/18761 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 2%CPEs: 1EXPL: 0

Stack-based buffer overflows in the (1) xmlvarcharfromfile, (2) xmlclobfromfile, (3) xmlfilefromvarchar, and (4) xmlfilefromclob function calls in IBM DB2 8.1 allow remote attackers to execute arbitrary code via a 94-byte second argument, which causes the return address to be overwritten with a pointer to the argument. • http://marc.info/?l=bugtraq&m=110495554227717&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg1IY62297 http://www.nextgenss.com/advisories/db205012005H.txt http://www.securityfocus.com/bid/11404 https://exchange.xforce.ibmcloud.com/vulnerabilities/17617 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 2.1EPSS: 0%CPEs: 9EXPL: 0

Unknown vulnerability in IBM DB2 8.1.4 through 8.1.9 and 8.2.0 through 8.2.2 allows local users with SELECT privileges to conduct unauthorized activities and insert, update or delete table contents. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY73104&apar=only •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

Multiple buffer overflows in IBM DB2 Universal Database 8.1 may allow local users to execute arbitrary code via long command line arguments to (1) db2start, (2) db2stop, or (3) db2govd. Múltiples desbordamientos de búfer en IBM DB2 Universal Database 8.1 pueden permitir a usuarios locales ejecutar código de su elección mediante argumentos de línea de comandos largos a (1)db2start, (2) db2stop, o (3) db2govd. • https://www.exploit-db.com/exploits/23349 https://www.exploit-db.com/exploits/23347 https://www.exploit-db.com/exploits/23348 http://www.secnetops.com/research/advisories/SRT2003-11-06-0710.txt http://www.securityfocus.com/archive/1/343804 http://www.securityfocus.com/bid/8990 https://exchange.xforce.ibmcloud.com/vulnerabilities/13633 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 4

Multiple format string vulnerabilities in IBM DB2 Universal Database 8.1 may allow local users to execute arbitrary code via certain command line arguments to (1) db2start, (2) db2stop, or (3) db2govd. Múltiples vulnerabilidades de cadena de formato en IBM Universal Database 8.1 puede permitir a usuarios locales ejecutar código arbitrario mediante ciertos argumentos de línea de comando a (1) db2start, (2) db2stop, or (3) db2govd. • https://www.exploit-db.com/exploits/23346 https://www.exploit-db.com/exploits/23344 https://www.exploit-db.com/exploits/23345 http://www.secnetops.com/research/advisories/SRT2003-11-06-0710.txt http://www.securityfocus.com/archive/1/343804 http://www.securityfocus.com/bid/8989 https://exchange.xforce.ibmcloud.com/vulnerabilities/13633 •