Download
| Alert*
oval:org.secpod.oval:def:5157
The host is installed with IBM DB2 9.5 before FP9 and is prone to denial of service vulnerability. A flaw is present in the application, which calls the XMLPARSE function with a crafted string expression. Successful exploitation allows remote attackers to deny service to legitimate users. oval:org.secpod.oval:def:5156 The host is installed with IBM DB2 9.5 before FP9 and is prone to security bypass vulnerability. A flaw is present in the application, which is caused by improper checks on variables. Successful exploitation allows remote authenticated users to bypass intended restrictions on viewing table data by l ... oval:org.secpod.oval:def:5155 The host is installed with IBM DB2 9.1 before FP11 or 9.5 before FP9 or 9.7 before FP5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Distributed Relational Database Architecture (DRDA) request. Successful exploitation allows re ... oval:org.secpod.oval:def:5154 The host is installed with IBM DB2 9.5 before FP9 and is prone to denial of service vulnerability. A flaw is present in the application, which calls the XMLPARSE function with a crafted string expression. Successful exploitation allows remote attackers to deny service to legitimate users. oval:org.secpod.oval:def:5159 The host is installed with IBM DB2 9.5 before FP9 and is prone to security bypass vulnerability. A flaw is present in the application, which is caused by improper checks on variables. Successful exploitation allows remote authenticated users to bypass intended restrictions on viewing table data by l ... oval:org.secpod.oval:def:5158 The host is installed with IBM DB2 9.1 before FP11 or 9.5 before FP9 or 9.7 before FP5 or 9.8 before FP4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted Distributed Relational Database Architecture (DRDA) request. Successful expl ... oval:org.secpod.oval:def:5161 The host is installed with IBM DB2 9.1 through FP11 or 9.5 before FP9 or 9.7 through FP5 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused by a signedness error in the db2dasrrm process. Successful exploitation allows remote attackers to ... |