Lucene search

K

5 matches found

CVE
CVE
added 2023/11/20 9:15 a.m.294 views

CVE-2022-46337

A cleverly devised username might bypass LDAP authentication checks. InLDAP-authenticated Derby installations, this could let an attacker fillup the disk by creating junk Derby databases. In LDAP-authenticatedDerby installations, this could also allow the attacker to executemalware which was visibl...

9.8CVSS9.8AI score0.00045EPSS
CVE
CVE
added 2018/05/07 1:29 p.m.122 views

CVE-2018-1313

In Apache Derby 10.3.1.4 to 10.14.1.0, a specially-crafted network packet can be used to request the Derby Network Server to boot a database whose location and contents are under the user's control. If the Derby Network Server is not running with a Java Security Manager policy file, the attack is s...

5.3CVSS6.2AI score0.00715EPSS
CVE
CVE
added 2017/10/23 1:29 p.m.73 views

CVE-2010-2232

In Apache Derby 10.1.2.1, 10.2.2.0, 10.3.1.4, and 10.4.1.3, Export processing may allow an attacker to overwrite an existing file.

7.5CVSS7.3AI score0.01673EPSS
CVE
CVE
added 2010/08/16 8:0 p.m.69 views

CVE-2009-4269

The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crac...

2.1CVSS9AI score0.00784EPSS
CVE
CVE
added 2007/07/05 8:0 p.m.65 views

CVE-2005-4849

Apache Derby before 10.1.2.1 exposes the (1) user and (2) password attributes in cleartext via (a) the RDBNAM parameter of the ACCSEC command and (b) the output of the DatabaseMetaData.getURL function, which allows context-dependent attackers to obtain sensitive information.

5CVSS6.5AI score0.02327EPSS