Page 25 of 123 results (0.007 seconds)

CVSS: 4.0EPSS: 0%CPEs: 11EXPL: 0

The XSLT library in IBM DB2 and DB2 Connect 9.5 through 10.5, and the DB2 pureScale Feature 9.8 for Enterprise Server Edition, allows remote authenticated users to cause a denial of service via unspecified vectors. La librería XSLT en IBM DB2 y DB2 Connect 9.5 hasta 10.5, y DB2 pureScale Feature 9.8 para Enterprise Server Edition, permite a usuarios remotos autenticados causar una denegación de servicio a través de vectores no especificados. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC97402 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97470 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97471 http://www-01.ibm.com/support/docview.wss?uid=swg1IC97472 http://www-01.ibm.com/support/docview.wss? •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The Fast Communications Manager (FCM) in IBM DB2 Enterprise Server Edition and Advanced Enterprise Server Edition 10.1 before FP3 and 10.5, when a multi-node configuration is used, allows remote attackers to cause a denial of service via vectors involving arbitrary data. Fast Communications Manager (FCM) en IBM DB2 Enterprise Server Edition y Advanced Enterprise Server Edition 10.1 anterior a la versión FP3 y 10.5, cuando se utiliza una configuración de varios nodos, permite a atacantes remotos causar una denegación de servicio a través de vectores que involucren datos arbitrarios. • http://www-01.ibm.com/support/docview.wss?uid=swg1IC94434 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94939 http://www-01.ibm.com/support/docview.wss?uid=swg21650231 https://exchange.xforce.ibmcloud.com/vulnerabilities/86092 • CWE-20: Improper Input Validation •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

IBM DB2 and DB2 Connect 9.7 through FP8, 9.8 through FP5, 10.1 through FP2, and 10.5 through FP1 allow remote authenticated users to execute DML statements by leveraging EXPLAIN authority. IBM DB2 y DB2 Connect v9.7 hasta FP8, v9.8 hasta FP5, v10.1 hasta FP2, y v10.5 hasta FP1 permiten a los usuarios remotos autenticados ejecutar instrucciones DML mediante el aprovechamiento de la autoridad "EXPLAIN". • http://www-01.ibm.com/support/docview.wss?uid=swg1IC94523 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94756 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94757 http://www-01.ibm.com/support/docview.wss?uid=swg1IC94758 http://www-01.ibm.com/support/docview.wss? • CWE-264: Permissions, Privileges, and Access Controls •