Lucene search

K
IbmDb2 Mirror For I7.5

5 matches found

CVE
CVE
added 2023/04/07 2:15 p.m.89 views

CVE-2022-43928

The IBM Toolbox for Java (Db2 Mirror for i 7.4 and 7.5) could allow a user to obtain sensitive information, caused by utilizing a Java string for processing. Since Java strings are immutable, their contents exist in memory until garbage collected. This means sensitive data could be visible in memor...

6.5CVSS5.4AI score0.0005EPSS
CVE
CVE
added 2024/06/15 2:15 p.m.48 views

CVE-2024-31870

IBM Db2 for i 7.2, 7.3, 7.4, and 7.5 supplies user defined table function is vulnerable to user enumeration by a local authenticated attacker, without having authority to the related *USRPRF objects. This can be used by a malicious actor to gather information about users that can be targeted in fur...

3.3CVSS3.5AI score0.00033EPSS
CVE
CVE
added 2023/12/18 8:15 p.m.41 views

CVE-2023-47741

IBM i 7.3, 7.4, 7.5, IBM i Db2 Mirror for i 7.4 and 7.5 web browser clients may leave clear-text passwords in browser memory that can be viewed using common browser tools before the memory is garbage collected. A malicious actor with access to the victim's PC could exploit this vulnerability to gai...

5.3CVSS5.3AI score0.00037EPSS
CVE
CVE
added 7 hours ago2 views

CVE-2025-36116

IBM Db2 Mirror for i 7.4, 7.5, and 7.6 GUI is affected by cross-site WebSocket hijacking vulnerability. By sending a specially crafted request, an unauthenticated malicious actor could exploit this vulnerability to sniff an existing WebSocket connection to then remotely perform operations that the ...

6.3CVSS
CVE
CVE
added 7 hours ago1 views

CVE-2025-36117

IBM Db2 Mirror for i 7.4, 7.5, and 7.6 does not disallow the session id after use which could allow an authenticated user to impersonate another user on the system.

6.3CVSS