Page 19 of 105 results (0.004 seconds)

CVSS: 8.5EPSS: 0%CPEs: 19EXPL: 0

The Stored Procedure infrastructure in IBM DB2 9.5, 9.7 before FP9a, 10.1 before FP3a, and 10.5 before FP3a on Windows allows remote authenticated users to gain privileges by leveraging the CONNECT privilege and the CREATE_EXTERNAL_ROUTINE authority. La infraestructura Stored Procedure en IBM DB2 9.5, 9.7 anterior a FP9a, 10.1 anterior a FP3a y 10.5 anterior a FP3a en Windows permite a usuarios remotos autenticados ganar privilegios mediante el aprovechamiento del privilegio CONNECT y la autoridad CREATE_EXTERNAL_ROUTINE. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC98849 http://www-01.ibm.com/support/docview.wss?uid=swg1IC99478 http://www-01.ibm.com/support/docview.wss?uid=swg1IC99480 http://www-01.ibm.com/support/docview.wss?uid=swg1IC99481 http://www.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 18EXPL: 0

Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library. Múltiples vulnerabilidades de búsqueda de ruta no confiable en programas no especificados (1) setuid y (2) setgid en IBM DB2 9.5, 9.7 anterior a FP9a, 9.8, 10.1 anterior a FP3a y 10.5 anterior a FP3a en Linux y UNIX permiten a usuarios locales ganar privilegios root a través de una libraría caballo de troya. • http://packetstormsecurity.com/files/126940/IBM-DB2-Privilege-Escalation.html http://seclists.org/fulldisclosure/2014/Jun/7 http://secunia.com/advisories/59451 http://secunia.com/advisories/59463 http://secunia.com/advisories/60482 http://www-01.ibm.com/support/docview.wss?uid=isg400001841 http://www-01.ibm.com/support/docview.wss?uid=isg400001843 http://www-01.ibm.com/support/docview.wss?uid=swg1IT00627 http://www-01.ibm.com/support/docview.wss?uid=swg1IT00684 http://www-01. •

CVSS: 4.0EPSS: 0%CPEs: 43EXPL: 0

The OLAP query engine in IBM DB2 and DB2 Connect 9.7 through FP9, 9.8 through FP5, 10.1 through FP3, and 10.5 through FP2, and the DB2 pureScale Feature 9.8 for Enterprise Server Edition, allows remote authenticated users to cause a denial of service (database outage and deactivation) via unspecified vectors. El motor de consultas OLAP en IBM DB2 y DB2 Connect 9.7 hasta FP9, 9.8 hasta FP3, y 10.6 hasta FP2, y la pureScale Feature 9.8 para Enterprise Server Edition, permite ausuarios autenticados remotamente causar denegación de servicio (interrupción de la base de datos y desactivación) a través de vectores no especificados. • http://secunia.com/advisories/56451 http://www-01.ibm.com/support/docview.wss?uid=swg1IC95641 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97737 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97738 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97762 http://www-01.ibm.com/support/docview.wss? •

CVSS: 4.0EPSS: 0%CPEs: 11EXPL: 0

The XSLT library in IBM DB2 and DB2 Connect 9.5 through 10.5, and the DB2 pureScale Feature 9.8 for Enterprise Server Edition, allows remote authenticated users to cause a denial of service via unspecified vectors. La librería XSLT en IBM DB2 y DB2 Connect 9.5 hasta 10.5, y DB2 pureScale Feature 9.8 para Enterprise Server Edition, permite a usuarios remotos autenticados causar una denegación de servicio a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC97402 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97470 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97471 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97472 http://www-01.ibm.com/support/docview.wss? •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority. IBM DB2 y DB2 Connect v9.7 hasta FP8, v9.8 hasta FP5, v10.1 hasta FP2, y v10.5 hasta FP1 permiten a los usuarios remotos autenticados ejecutar instrucciones DML mediante el aprovechamiento de la autoridad "EXPLAIN". • http://www-01.ibm.com/support/docview.wss?uid=swg1IC94523 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94756 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94757 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94758 http://www-01.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •