📦 Yottadb

by Yottadb

🔍 What is Yottadb?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2021-44486

CRITICAL CVSS 9.8 Apr 15, 2022

This vulnerability allows attackers to execute arbitrary code by manipulating a function pointer in YottaDB's op_write function. Attackers can gain control of execution flow through crafted input, pot...

CVE-2021-44488

CRITICAL CVSS 9.1 Apr 15, 2022

This vulnerability in YottaDB allows attackers to craft malicious input that triggers memory corruption through improper bounds checking in the memcpy function. Attackers could potentially execute arb...

CVE-2021-44481

HIGH CVSS 7.5 Apr 15, 2022

This vulnerability in YottaDB allows attackers to trigger a NULL pointer dereference by exploiting insufficient parameter validation in memory copy operations. It affects all YottaDB users running ver...

CVE-2021-44483

HIGH CVSS 7.5 Apr 15, 2022

This vulnerability in YottaDB allows attackers to crash applications by triggering a divide-by-zero error through improper input validation. It affects all users running vulnerable versions of YottaDB...

CVE-2021-44485

HIGH CVSS 7.5 Apr 15, 2022

This CVE describes a NULL pointer dereference vulnerability in YottaDB that allows attackers to crash the application by triggering a NULL pointer access in the trip_gen function. All users running af...

CVE-2021-44490

HIGH CVSS 7.5 Apr 15, 2022

This vulnerability allows attackers to cause a denial-of-service (DoS) by crashing YottaDB applications through crafted input that triggers an integer miscalculation in memory allocation. Attackers ca...

CVE-2021-44492

HIGH CVSS 7.5 Apr 15, 2022

This vulnerability in YottaDB and FIS GT.M database systems allows attackers to cause a crash via a NULL pointer dereference by sending crafted input to the f_incr function. It affects all systems run...

CVE-2021-44494

HIGH CVSS 7.5 Apr 15, 2022

This vulnerability allows attackers to cause denial of service by crashing YottaDB or GT.M database systems through crafted input to ZRead commands. It affects all users running vulnerable versions of...