Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x59g-h3vc-hf9j

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile.

Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile.

EPSS

Процентиль: 56%
0.00343
Низкий

Связанные уязвимости

nvd
около 20 лет назад

Certain XML functions in IBM DB2 8.1 run with the privileges of DB2 instead of the logged-in user, which allows remote attackers to create or overwrite files via (1) XMLFileFromVarchar or (2) XMLFileFromClob, or read files via (3) XMLVarcharFromFile or (4) XMLClobFromFile.

EPSS

Процентиль: 56%
0.00343
Низкий