Логотип exploitDog
bind:CVE-2014-0919
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-0919

Количество 3

Количество 3

ubuntu логотип

CVE-2014-0919

почти 11 лет назад

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.

CVSS2: 4
EPSS: Низкий
nvd логотип

CVE-2014-0919

почти 11 лет назад

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.

CVSS2: 4
EPSS: Низкий
github логотип

GHSA-2qr8-j262-h7fw

больше 3 лет назад

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-0919

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.

CVSS2: 4
0%
Низкий
почти 11 лет назад
nvd логотип
CVE-2014-0919

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.

CVSS2: 4
0%
Низкий
почти 11 лет назад
github логотип
GHSA-2qr8-j262-h7fw

IBM DB2 9.5 through 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these facilities.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу