solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.
Max CVSS
9.3
EPSS Score
1.31%
Published
2011-04-05
Updated
2017-08-17
solid.exe in IBM solidDB before 6.5 FP2 allows remote attackers to execute arbitrary code via a long username field in the first handshake packet.
Max CVSS
10.0
EPSS Score
2.02%
Published
2010-07-22
Updated
2010-07-22
2 vulnerabilities found