Page 23 of 127 results (0.010 seconds)

CVSS: 9.1EPSS: 0%CPEs: 10EXPL: 0

IBM GSKit (IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1) duplicates the PRNG state across fork() system calls when multiple ICC instances are loaded which could result in duplicate Session IDs and a risk of duplicate key material. IBM X-Force ID: 139071. IBM GSKit (IBM DB2 para Linux, UNIX y Windows 9.7, 10.1, 10.5 y 11.1) duplica el estado PRNG a lo largo de las llamadas de sistema fork() cuando se cargan múltiples instancias ICC. Esto podría resultar en ID de sesión duplicados y en el riesgo de que se duplique material clave. IBM X-Force ID: 139071. • http://www.ibm.com/support/docview.wss?uid=swg22013756 http://www.securityfocus.com/bid/105580 http://www.securitytracker.com/id/1041012 https://exchange.xforce.ibmcloud.com/vulnerabilities/139071 • CWE-335: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) •

CVSS: 7.7EPSS: 0%CPEs: 10EXPL: 0

IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1 (includes DB2 Connect Server) contains a vulnerability that could allow a local user to overwrite arbitrary files owned by the DB2 instance owner. IBM X-Force ID: 140043. IBM DB2 para Linux, UNIX y Windows 9.7, 10,1, 10.5 y 11.1 (incluido DB2 Connect Server) contiene una vulnerabilidad que podría permitir a un usuario local sobrescribir archivos arbitrarios pertenecientes al propietario de la instancia del DB2. IBM X-Force ID: 140043. • http://www.ibm.com/support/docview.wss?uid=swg22014388 http://www.securityfocus.com/bid/103535 https://exchange.xforce.ibmcloud.com/vulnerabilities/140043 •

CVSS: 6.2EPSS: 0%CPEs: 10EXPL: 0

IBM GSKit (IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 139073. IBM GSKit (IBM DB2 para Linux, UNIX y Windows 9.7, 10.1, 10.5 y 11.1) emplea algoritmos criptográficos más débiles de lo esperado que podrían permitir que un atacante descifre información altamente sensible. IBM X-Force ID: 139073. • http://www.ibm.com/support/docview.wss?uid=swg22013756 http://www.securityfocus.com/bid/103574 http://www.securitytracker.com/id/1041012 https://exchange.xforce.ibmcloud.com/vulnerabilities/139073 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 0

IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 131853. IBM DB2 (IBM DB2 para Linux, UNIX y Windows (incluyendo DB2 Connect Server), en versiones 9.7, 10.1, 10.5 y 11.1, emplea algoritmos criptográficos más débiles de lo esperado que podrían permitir que un atacante descifre información altamente sensible. IBM X-Force ID: 131853. • http://www.ibm.com/support/docview.wss?uid=swg22012948 http://www.securityfocus.com/bid/103494 https://exchange.xforce.ibmcloud.com/vulnerabilities/131853 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 6.2EPSS: 0%CPEs: 10EXPL: 0

IBM GSKit (IBM DB2 for Linux, UNIX and Windows 9.7, 10.1, 10.5, and 11.1) contains several environment variables that a local attacker could overflow and cause a denial of service. IBM X-Force ID: 139072. IBM GSKit (IBM DB2 para Linux, UNIX y Windows 9.7, 10.1, 10.5 y 11.1) contiene diversas variables de entorno que podrían ser desbordadas por un atacante y provocar una denegación de servicio (DoS). IBM X-Force ID: 139072. • http://www.ibm.com/support/docview.wss?uid=swg22013756 http://www.securityfocus.com/bid/103536 http://www.securitytracker.com/id/1041012 https://exchange.xforce.ibmcloud.com/vulnerabilities/139072 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •