CVE-2005-4871
https://notcve.org/view.php?id=CVE-2005-4871
Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile. • http://marc.info/?l=bugtraq&m=110495620513954&w=2 http://secunia.com/advisories/12733 http://www.ngssoftware.com/advisories/db205012005I.txt http://www.securityfocus.com/bid/12170 https://exchange.xforce.ibmcloud.com/vulnerabilities/18761 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-4870
https://notcve.org/view.php?id=CVE-2005-4870
Stack-based buffer overflows in the (1) xmlvarcharfromfile, (2) xmlclobfromfile, (3) xmlfilefromvarchar, and (4) xmlfilefromclob function calls in IBM DB2 8.1 allow remote attackers to execute arbitrary code via a 94-byte second argument, which causes the return address to be overwritten with a pointer to the argument. • http://marc.info/?l=bugtraq&m=110495554227717&w=2 http://secunia.com/advisories/12733 http://www-1.ibm.com/support/docview.wss?uid=swg1IY62297 http://www.nextgenss.com/advisories/db205012005H.txt http://www.securityfocus.com/bid/11404 https://exchange.xforce.ibmcloud.com/vulnerabilities/17617 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2005-2073
https://notcve.org/view.php?id=CVE-2005-2073
Unknown vulnerability in IBM DB2 8.1.4 through 8.1.9 and 8.2.0 through 8.2.2 allows local users with SELECT privileges to conduct unauthorized activities and insert, update or delete table contents. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY73104&apar=only •