Fisglobal

Gt.M

28 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.25%
  • Veröffentlicht 15.04.2022 18:15:09
  • Zuletzt bearbeitet 21.11.2024 06:31:06

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause a type to be incorrectly initialized in the function f_incr in sr_port/f_incr.c and cause a crash due to a NULL pointer ...

  • EPSS 0.35%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:05

An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, an attacker can cause a NULL pointer dereference after calls to ZPrint.

  • EPSS 0.35%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:05

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, can cause the bounds of a for loop to be miscalculated, which leads to a use after free condition a pointer is pushed into previously free m...

  • EPSS 1.16%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:05

An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data stru...

Exploit
  • EPSS 0.25%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:03

An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of parameter validation in calls to memcpy in check_and_set_timeout in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer.

  • EPSS 0.35%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:05

An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, an attacker can cause calls to ZRead to crash due to a NULL pointer dereference.

  • EPSS 0.4%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:05

An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, whi...

  • EPSS 0.25%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:05

An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, attackers can cause a type to be incorrectly initialized in the function f_incr in sr_port/f_incr.c and cause a crash due to a NULL poin...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentatio...

Exploit
  • EPSS 0.27%
  • Veröffentlicht 15.04.2022 18:15:08
  • Zuletzt bearbeitet 21.11.2024 06:31:04

An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentatio...