Page 3 of 16 results (0.034 seconds)

CVSS: 6.5EPSS: 0%CPEs: 8EXPL: 0

The ifx_load_internal function in IBM Informix Dynamic Server (IDS) allows remote authenticated users to execute arbitrary C code via the DllMain or _init function in a library, aka "C code UDR." La función ifx_load_internal en IBM Informix Dynamic Server (IDS) permite a usuarios remotos autenticados ejecutar código C arbitrario a través de la función DllMain o _init en una librería, también conocido como "C code UDR". • http://secunia.com/advisories/21301 http://www-1.ibm.com/support/docview.wss?uid=swg21242921 http://www.databasesecurity.com/informix/DatabaseHackersHandbook-AttackingInformix.pdf http://www.osvdb.org/27689 http://www.securityfocus.com/archive/1/443133/100/0/threaded http://www.securityfocus.com/archive/1/443184/100/0/threaded http://www.securityfocus.com/bid/19264 http://www.vupen.com/english/advisories/2006/3077 https://exchange.xforce.ibmcloud.com/vulnerabilities/28129 •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

IBM Informix Dynamic Server (IDS) before 9.40.xC8 and 10.00 before 10.00.xC4 stores passwords in plaintext in shared memory, which allows local users to obtain passwords by reading the memory (product defects 171893, 171894, 173772). IBM Informix Dynamic Server (IDS) anterior a 9.40.xC8 y 10.00 anterior a 10.00.xC4 almacena contraseñas en texto plano en memoria compartida, lo cual permite a usuarios locales obtener contraseñas leyendo la memoria (defectos de producto 171893, 171894, 173772). • http://secunia.com/advisories/21301 http://www-1.ibm.com/support/docview.wss?uid=swg21242921 http://www.databasesecurity.com/informix/DatabaseHackersHandbook-AttackingInformix.pdf http://www.osvdb.org/27691 http://www.securityfocus.com/archive/1/443133/100/0/threaded http://www.securityfocus.com/archive/1/443195/100/0/threaded http://www.securityfocus.com/bid/19264 http://www.vupen.com/english/advisories/2006/3077 https://exchange.xforce.ibmcloud.com/vulnerabilities/28132 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in IBM Informix Dynamic Server (IDS) 9.40.xC1 and 9.40.xC2 allows local users to execute arbitrary code via a long GL_PATH environment variable. • http://marc.info/?l=bugtraq&m=107524391217364&w=2 http://secunia.com/advisories/10737 http://www-1.ibm.com/support/docview.wss?uid=swg21153336 http://www.osvdb.org/3756 http://www.securityfocus.com/bid/9511 https://exchange.xforce.ibmcloud.com/vulnerabilities/14949 •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 0

Format string vulnerability in IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to execute arbitrary code via a modified INFORMIXDIR environment variable that points to a file with format string specifiers in the filename. • http://marc.info/?l=bugtraq&m=107524391217364&w=2 http://secunia.com/advisories/10737 http://www-1.ibm.com/support/docview.wss?uid=swg21153336 http://www.osvdb.org/3757 http://www.securityfocus.com/bid/9511 https://exchange.xforce.ibmcloud.com/vulnerabilities/14967 •

CVSS: 3.6EPSS: 0%CPEs: 4EXPL: 2

IBM Informix Dynamic Server (IDS) before 9.40.xC3 allows local users to (1) create or overwrite files via the /001 log file to onedcu or (2) read arbitrary files via a symlink attack on a file in /tmp to onshowaudit. • http://secunia.com/advisories/10737 http://www-1.ibm.com/support/docview.wss?uid=swg21153336 http://www.osvdb.org/3758 http://www.osvdb.org/3760 http://www.securityfocus.com/archive/1/351770 http://www.securityfocus.com/bid/9511 http://www.securityfocus.com/bid/9512 https://exchange.xforce.ibmcloud.com/vulnerabilities/14969 https://exchange.xforce.ibmcloud.com/vulnerabilities/14971 •