Page 8 of 49 results (0.005 seconds)

CVSS: 10.0EPSS: 22%CPEs: 24EXPL: 0

Stack-based buffer overflow in call in IBM DB2 7.x and 8.1 allows remote attackers to execute arbitrary code via a long libname. • http://marc.info/?l=bugtraq&m=110495173031208&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg1IY62041 http://www-1.ibm.com/support/docview.wss?uid=swg21181228 http://www.nextgenss.com/advisories/db205012005C.txt http://www.securityfocus.com/bid/11399 https://exchange.xforce.ibmcloud.com/vulnerabilities/17611 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 2%CPEs: 12EXPL: 3

IBM DB2 Universal Database (UDB) 810 before 8.1 FP10 allows remote authenticated users to cause a denial of service (application crash) via (1) certain equality predicates that trigger self-removal, aka IY70808; and (2) a query with more than 32000 elements in the IN-list, aka LI70817. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY70808 http://www-1.ibm.com/support/docview.wss?uid=swg1LI70817 http://www.securityfocus.com/bid/15126 •

CVSS: 9.3EPSS: 31%CPEs: 24EXPL: 0

Stack-based buffer overflow in the SATENCRYPT function in IBM DB2 8.1, when Satellite Administration (SATADMIN) is enabled, allows remote attackers to execute arbitrary code via a long parameter. • http://marc.info/?l=bugtraq&m=110495332301120&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg21181228 http://www-1.ibm.com/support/search.wss?rs=0&q=IY62040&apar=only http://www.ngssoftware.com/advisories/db205012005E.txt http://www.securityfocus.com/bid/11396 https://exchange.xforce.ibmcloud.com/vulnerabilities/17612 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 2

IBM DB2 Universal Database (UDB) 820 before 8.2 FP10 allows remote authenticated users to cause a denial of service (disk consumption) via a hash join (hsjn) that triggers an infinite loop in sqlri_hsjnFlushBlocks. • http://secunia.com/advisories/17031 http://www-1.ibm.com/support/docview.wss?uid=swg1IY70561 http://www.securityfocus.com/bid/15126 •

CVSS: 6.8EPSS: 2%CPEs: 24EXPL: 0

Stack-based buffer overflow in JDBC Applet Server in IBM DB2 8.1 allows remote attackers to execute arbitrary by connecting and sending a long username, then disconnecting gracefully and reconnecting and sending a short username and an unexpected db2java.zip version, which causes a null terminator to be removed and leads to the overflow. • http://marc.info/?l=bugtraq&m=110495251101381&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg1IY61492 http://www.nextgenss.com/advisories/db205012005D.txt http://www.securityfocus.com/bid/11401 https://exchange.xforce.ibmcloud.com/vulnerabilities/17613 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •