Page 21 of 103 results (0.012 seconds)

CVSS: 7.3EPSS: 0%CPEs: 38EXPL: 1

IBM DB2 for Linux, UNIX and Windows 9.2, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) is vulnerable to a stack-based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code. IBM X-Force ID: 125159. IBM DB2 para Linux, Unix y Windows 9.2, 10.1, 10.5 y 11.1 (incluido DB2 Connect Server) es vulnerable a un buffer overflow basado en pila --stack-- causado por una inapropiada verificación de límites lo que podría permitir a un atacante local ejecutar código aleatorio. IBM DB2 versions 9.7, 10.1, 10.5, and 11.1 suffer from a command line process buffer overflow vulnerability. • https://www.exploit-db.com/exploits/42260 http://www.ibm.com/support/docview.wss?uid=swg22004878 http://www.securityfocus.com/bid/99271 http://www.securitytracker.com/id/1038772 https://exchange.xforce.ibmcloud.com/vulnerabilities/125159 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 3.5EPSS: 0%CPEs: 18EXPL: 0

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.1, 10.5, and 11.1 could allow an authenticated attacker with specialized access to tables that they should not be permitted to view. IBM Reference #: 1999515. IBM DB2 para Linux, UNIX y Windows (incluye DB2 Connect Server) 10.1, 10.5 y 11.1 podría permitir a un atacante autenticado con acceso especializado a tablas que no se debería permitir ver. Referencia IBM #: 1999515. • http://www.ibm.com/support/docview.wss?uid=swg21999515 http://www.securityfocus.com/bid/96597 http://www.securitytracker.com/id/1037946 • CWE-269: Improper Privilege Management •

CVSS: 7.3EPSS: 0%CPEs: 246EXPL: 0

Untrusted search path vulnerability in IBM DB2 9.7 through FP11, 10.1 through FP5, 10.5 before FP8, and 11.1 GA on Linux, AIX, and HP-UX allows local users to gain privileges via a Trojan horse library that is accessed by a setuid or setgid program. Vulnerabilidad de ruta de búsqueda no confiable en IBM DB2 9.7 hasta la versión FP11, 10.1 hasta la versión FP5, 10.5 en versiones anteriores a FP8 y 11.1 GA en Linux, AIX y HP-UX permite a usuarios locales obtener privilegios a través de una librería troyanizada a la que se accede mediante un programa setuid o setgid. • http://www-01.ibm.com/support/docview.wss?uid=swg1IT16921 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17010 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17011 http://www-01.ibm.com/support/docview.wss?uid=swg1IT17012 http://www-01.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •