Yottadb

Yottadb

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.25%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:03

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of parameter validation in calls to memcpy in check_and_set_timeout in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:03

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:03

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to eb_div in sr_port/eb_muldiv.c allows attackers to crash the application by performing a divide by zero.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:03

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of NULL checks in calls to emit_trip in sr_port/emit_code.c allows attackers to crash the application by dereferencing a NULL pointer.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:03

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of NULL checks in trip_gen in sr_port/emit_code.c allows attackers to crash the application by dereferencing a NULL pointer.

Exploit
  • EPSS 0.4%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can manipulate the value of a function pointer used in op_write in sr_port/op_write.c in order to gain control of the flow of execution.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of NULL checks in calls to ious_open in sr_unix/ious_open.c allows attackers to crash the application by dereferencing a NULL pointer.

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can control the size and input to calls to memcpy in op_fnfnumber in sr_port/op_fnfnumber.c in order to corrupt memory or crash the application.

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the applicati...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentatio...