📦 Yottadb
by Yottadb
🔍 What is Yottadb?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability allows attackers to execute arbitrary code by manipulating a function pointer in YottaDB's op_write function. Attackers can gain control of execution flow through crafted input, pot...
This vulnerability in YottaDB allows attackers to craft malicious input that triggers memory corruption through improper bounds checking in the memcpy function. Attackers could potentially execute arb...
This vulnerability in YottaDB allows attackers to trigger a NULL pointer dereference by exploiting insufficient parameter validation in memory copy operations. It affects all YottaDB users running ver...
This vulnerability in YottaDB allows attackers to crash applications by triggering a divide-by-zero error through improper input validation. It affects all users running vulnerable versions of YottaDB...
This CVE describes a NULL pointer dereference vulnerability in YottaDB that allows attackers to crash the application by triggering a NULL pointer access in the trip_gen function. All users running af...
This vulnerability allows attackers to cause a denial-of-service (DoS) by crashing YottaDB applications through crafted input that triggers an integer miscalculation in memory allocation. Attackers ca...
This vulnerability in YottaDB and FIS GT.M database systems allows attackers to cause a crash via a NULL pointer dereference by sending crafted input to the f_incr function. It affects all systems run...
This vulnerability allows attackers to cause denial of service by crashing YottaDB or GT.M database systems through crafted input to ZRead commands. It affects all users running vulnerable versions of...