4 results (0.431 seconds)

CVSS: 5.0EPSS: 23%CPEs: 9EXPL: 4

Buffer overflow in ibserver for Firebird Database 1.0 and other versions before 1.5, and possibly other products that use the InterBase codebase, allows remote attackers to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command. • https://www.exploit-db.com/exploits/303 https://www.exploit-db.com/exploits/24165 http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0027.html http://marc.info/?l=bugtraq&m=108611386202493&w=2 http://secunia.com/advisories/11756 http://secunia.com/advisories/19350 http://securitytracker.com/id?1010381 http://www.debian.org/security/2006/dsa-1014 http://www.osvdb.org/6408 http://www.osvdb.org/6624 http://www.securiteam.com/unixfocus/5AP0P0UCUO.html http:& •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 2

The admin.ib file in Borland Interbase 7.1 for Linux has default world writable permissions, which allows local users to gain database administrative privileges. • http://secunia.com/advisories/11172 http://securitytracker.com/id?1009500 http://www.idefense.com/application/poi/display?id=80&type=vulnerabilities&flashstatus=true http://www.osvdb.org/4381 http://www.securityfocus.com/bid/9929 https://exchange.xforce.ibmcloud.com/vulnerabilities/15546 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

Buffer overflow gds_lock_mgr of Interbase Database 6.x allows local users to gain privileges via a long ISC_LOCK_ENV environment variable (INTERBASE_LOCK). Desbordamiento de búfer gds_lock_mgr de Interbase Database 6.x permite a usuarios locales la obtención de privilegios mediante una variable de entorno ISC_LOCK_ENV larga. (INTERBASE_LOCK). • http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0003.html http://marc.info/?l=bugtraq&m=104940730819887&w=2 http://www.secnetops.com/research/advisories/SRT2003-04-03-1300.txt •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 3

gds_lock_mgr in Borland InterBase allows local users to overwrite files and gain privileges via a symlink attack on a "isc_init1.X" temporary file, as demonstrated by modifying the xinetdbd file. • https://www.exploit-db.com/exploits/21865 http://archives.neohapsis.com/archives/bugtraq/2002-09/0311.html http://www.iss.net/security_center/static/10196.php http://www.securityfocus.com/bid/5805 •