Page 2 of 60 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 11EXPL: 0

Stack-based buffer overflow in db2aud in the Audit Facility in IBM DB2 and DB2 Connect 9.1, 9.5, 9.7, 9.8, and 10.1, as used in Smart Analytics System 7600 and other products, allows local users to gain privileges via unspecified vectors. Desbordamiento de búfer basado en pila en db2aud en Audit Facility de IBM DB2 y DB2 Connect v9.1, v9.5, v9.7, v9.8 y v10.1, como se utiliza en Smart System Analytics 7600 y otros productos, permite a usuarios locales conseguir privilegios a través de vectores no especificados. • http://secunia.com/advisories/52663 http://secunia.com/advisories/53704 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92463 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92495 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92496 http://www-01.ibm.com/support/docview.wss?uid=swg1IC92498 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.5EPSS: 13%CPEs: 11EXPL: 0

Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stored procedure. Desbordamiento de búfer basado en pila en la infraestructura SQL/PSM (alias SQL Persistent Stored Module) Stored Procedure (SP) en IBM DB2 v9.1, v9.5, v9.7 antes de FP7, v9.8, y v10.1, podría permitir a usuarios remotos autenticados ejecutar código de su elección depurando un procedimiento almacenado. • http://osvdb.org/86414 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86765 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86781 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86782 http://www-01.ibm.com/support/docview.wss?uid=swg1IC86783 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 10%CPEs: 43EXPL: 0

Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges. Un desbordamiento de búfer basado en pila en la infraestructura de procedimiento almacenado de Java ('Java Stored Procedure infrastructure') en IBM DB2 v9.1 antes de FP12, v9.5 a FP9, v9.7 a FP6, v9.8 a FP5, y v10.1 permite a usuarios remotos autenticados ejecutar código de su elección aprovechándose de ciertos privilegios CONNECT y EXECUTE. • http://secunia.com/advisories/49919 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84555 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84752 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84753 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84754 http://www-01.ibm.com/support/docview.wss? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 0%CPEs: 43EXPL: 0

Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to replace JAR files via unspecified vectors. Una vulnerabilidad de salto de directorio en el procedimiento almacenado SQLJ.DB2_INSTALL_JAR en IBM DB2 v9.1 antes de FP12, v9.5 hasta FP9, v9.7 hasta FP6, v9.8 hasta FP5 y v10.1 permite a atacantes remotos reemplazar los archivos JAR a través de vectores no especificados. • http://secunia.com/advisories/49919 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84019 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84711 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84714 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84715 http://www-01.ibm.com/support/docview.wss? • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 5.0EPSS: 0%CPEs: 43EXPL: 0

IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote attackers to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure. IBM DB2 v9.1 antes de FP12, v9.5 hasta el FP9, v9.7 hasta el FP6, v9.8 hasta el FP5 y v10.1 permite a atacantes remotos leer archivos XML de su elección a través de los procedimientos almacenados (1) GET_WRAP_CFG_C o (2) GET_WRAP_CFG_C2. • http://secunia.com/advisories/49919 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84614 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84712 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84748 http://www-01.ibm.com/support/docview.wss?uid=swg1IC84750 http://www-01.ibm.com/support/docview.wss? • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •