Filtered by vendor Fisglobal
Subscriptions
Total
28 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-44499 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow. | ||||
CVE-2021-44485 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of NULL checks in trip_gen in sr_port/emit_code.c allows attackers to crash the application by dereferencing a NULL pointer. | ||||
CVE-2021-44487 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of NULL checks in calls to ious_open in sr_unix/ious_open.c allows attackers to crash the application by dereferencing a NULL pointer. | ||||
CVE-2021-44486 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 9.8 Critical |
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can manipulate the value of a function pointer used in op_write in sr_port/op_write.c in order to gain control of the flow of execution. | ||||
CVE-2021-44491 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentation fault and crash the application. This is a digs-- calculation. | ||||
CVE-2021-44510 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentation fault and crash the application. | ||||
CVE-2021-44493 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, an attacker can cause a call to $Extract to force an signed integer holding the size of a buffer to take on a large negative number, which is then used as the length of a memcpy call that occurs on the stack, causing a buffer overflow. | ||||
CVE-2021-44489 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the application. This is a "- digs" subtraction. | ||||
CVE-2021-44507 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of parameter validation in calls to memcpy in str_tok in sr_unix/ztimeoutroutines.c allows attackers to attempt to read from a NULL pointer. | ||||
CVE-2021-44502 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size of a memset that occurs in calls to util_format in sr_unix/util_output.c. | ||||
CVE-2021-44504 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause a size variable, stored as an signed int, to equal an extremely large value, which is interpreted as a negative value during a check. This value is then used in a memcpy call on the stack, causing a memory segmentation fault. | ||||
CVE-2021-44482 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to do_verify in sr_unix/do_verify.c allows attackers to attempt to jump to a NULL pointer by corrupting a function pointer. | ||||
CVE-2021-44494 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000 and FIS GT.M through V7.0-000. Using crafted input, an attacker can cause calls to ZRead to crash due to a NULL pointer dereference. | ||||
CVE-2021-44488 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 9.1 Critical |
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can control the size and input to calls to memcpy in op_fnfnumber in sr_port/op_fnfnumber.c in order to corrupt memory or crash the application. | ||||
CVE-2021-44496 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 9.8 Critical |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can control the size variable and buffer that is passed to a call to memcpy. An attacker can use this to overwrite key data structures and gain control of the flow of execution. | ||||
CVE-2021-44490 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. Using crafted input, attackers can cause a calculation of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c to result in an extremely large value in order to cause a segmentation fault and crash the application. This is a "- (digs < 1 ? 1 : digs)" subtraction. | ||||
CVE-2021-44501 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, an attacker can cause calls to ZRead to crash due to a NULL pointer dereference. | ||||
CVE-2021-44508 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). A lack of NULL checks in calls to ious_open in sr_unix/ious_open.c allows attackers to crash the application by dereferencing a NULL pointer. | ||||
CVE-2021-44509 | 1 Fisglobal | 1 Gt.m | 2024-08-04 | 7.5 High |
An issue was discovered in FIS GT.M through V7.0-000 (related to the YottaDB code base). Using crafted input, attackers can cause an integer underflow of the size of calls to memset in op_fnj3 in sr_port/op_fnj3.c in order to cause a segmentation fault and crash the application. | ||||
CVE-2021-44483 | 2 Fisglobal, Yottadb | 2 Gt.m, Yottadb | 2024-08-04 | 7.5 High |
An issue was discovered in YottaDB through r1.32 and V7.0-000. A lack of input validation in calls to eb_div in sr_port/eb_muldiv.c allows attackers to crash the application by performing a divide by zero. |