CVE-2021-29763
https://notcve.org/view.php?id=CVE-2021-29763
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 under very specific conditions, could allow a local user to keep running a procedure that could cause the system to run out of memory.and cause a denial of service. IBM X-Force ID: 202267. IBM Db2 para Linux, UNIX y Windows (incluye Db2 Connect Server) 11.1 y 11.5, en condiciones muy específicas, podría permitir a un usuario local seguir ejecutando un procedimiento que podría causar que el sistema se quedara sin memoria y causar una denegación de servicio. IBM X-Force ID: 202267 • https://exchange.xforce.ibmcloud.com/vulnerabilities/202267 https://security.netapp.com/advisory/ntap-20211029-0005 https://www.ibm.com/support/pages/node/6489493 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2021-21384 – Null characters not escaped in shescape
https://notcve.org/view.php?id=CVE-2021-21384
shescape is a simple shell escape package for JavaScript. In shescape before version 1.1.3, anyone using _Shescape_ to defend against shell injection may still be vulnerable against shell injection if the attacker manages to insert a into the payload. For an example see the referenced GitHub Security Advisory. The problem has been patched in version 1.1.3. No further changes are required. shescape es un paquete de escape de shell simple para JavaScript. • https://github.com/ericcornelissen/shescape/commit/07a069a66423809cbedd61d980c11ca44a29ea2b https://github.com/ericcornelissen/shescape/releases/tag/v1.1.3 https://github.com/ericcornelissen/shescape/security/advisories/GHSA-f2rp-38vg-j3gh https://www.npmjs.com/package/shescape • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •
CVE-2020-6294
https://notcve.org/view.php?id=CVE-2020-6294
Xvfb of SAP Business Objects Business Intelligence Platform, versions - 4.2, 4.3, platform on Unix does not perform any authentication checks for functionalities that require user identity. Xvfb de SAP Business Objects Business Intelligence Platform, versiones - 4.2, 4.3, una plataforma en Unix no lleva a cabo ninguna comprobación de autenticación para las funcionalidades que requieren la identidad del usuario • https://launchpad.support.sap.com/#/notes/2927956 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345 • CWE-306: Missing Authentication for Critical Function •
CVE-2019-4606
https://notcve.org/view.php?id=CVE-2019-4606
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 168298. La carga de IBM DB2 High Performance Unload para LUW versiones 6.1 y 6.5, podría permitir a un atacante local ejecutar código arbitrario en el sistema, causado por una vulnerabilidad de ruta de búsqueda no confiable. Mediante el uso de un archivo ejecutable, un atacante podría explotar esta vulnerabilidad para ejecutar código arbitrario en el sistema. • https://exchange.xforce.ibmcloud.com/vulnerabilities/168298 https://www.ibm.com/support/pages/node/1128063 • CWE-426: Untrusted Search Path •
CVE-2019-4523
https://notcve.org/view.php?id=CVE-2019-4523
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 165481. Una carga de IBM DB2 High Performance Unload para LUW versiones 6.1 y 6.5, es vulnerable a un desbordamiento del búfer, causado por una comprobación de límites inapropiada que podría permitir a un atacante local ejecutar código arbitrario en el sistema con privilegios de root. ID de IBM X-Force: 165481. • https://exchange.xforce.ibmcloud.com/vulnerabilities/165481 https://supportcontent.ibm.com/support/pages/node/1073236 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •