Show filters
97 Total Results
Displaying 31-40 of 97
Sort by:
Attacker Value
Unknown
CVE-2023-38169
Disclosure Date: August 08, 2023 (last updated January 11, 2025)
Microsoft SQL OLE DB Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-27866
Disclosure Date: June 28, 2023 (last updated October 08, 2023)
IBM Informix JDBC Driver 4.10 and 4.50 is susceptible to remote code execution attack via JNDI injection when driver code or the application using the driver do not verify supplied LDAP URL in Connect String. IBM X-Force ID: 249511.
0
Attacker Value
Unknown
CVE-2023-32027
Disclosure Date: June 16, 2023 (last updated January 11, 2025)
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-32026
Disclosure Date: June 16, 2023 (last updated January 11, 2025)
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-32025
Disclosure Date: June 16, 2023 (last updated January 11, 2025)
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-29356
Disclosure Date: June 16, 2023 (last updated January 11, 2025)
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-29349
Disclosure Date: June 16, 2023 (last updated January 11, 2025)
Microsoft ODBC and OLE DB Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2023-34364
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
0
Attacker Value
Unknown
CVE-2023-34363
Disclosure Date: June 09, 2023 (last updated October 08, 2023)
An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. When using Oracle Advanced Security (OAS) encryption, if an error is encountered initializing the encryption object used to encrypt data, the code falls back to a different encryption mechanism that uses an insecure random number generator to generate the private key. It is possible for a well-placed attacker to predict the output of this random number generator, which could lead to an attacker decrypting traffic between the driver and the database server. The vulnerability does not exist if SSL / TLS encryption is used.
0
Attacker Value
Unknown
CVE-2022-48282
Disclosure Date: February 21, 2023 (last updated October 08, 2023)
Under very specific circumstances (see Required configuration section below), a privileged user is able to cause arbitrary code to be executed which may cause further disruption to services. This is specific to applications written in C#. This affects all MongoDB .NET/C# Driver versions prior to and including v2.18.0
Following configuration must be true for the vulnerability to be applicable: * Application must written in C# taking arbitrary data from users and serializing data using _t without any validation AND
* Application must be running on a Windows host using the full .NET Framework, not .NET Core AND
* Application must have domain model class with a property/field explicitly of type System.Object or a collection of type System.Object (against MongoDB best practice) AND
* Malicious attacker must have unrestricted insert access to target database to add a _t discriminator."Following configuration must be true for the vulnerability to be applicable
0