Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
borland software interbase 5.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2001-0008
Backdoor account in Interbase database server allows remote malicious users to overwrite arbitrary files using stored procedures.
Firebirdsql Firebird
Borland Software Interbase 5.0
Borland Software Interbase 6.0
Borland Software Interbase 4.0
1 EDB exploit
7.5
CVSSv2
CVE-2004-1833
The admin.ib file in Borland Interbase 7.1 for Linux has default world writable permissions, which allows local users to gain database administrative privileges.
Borland Software Interbase 6.4
Borland Software Interbase 6.5
Borland Software Interbase 4.0
Borland Software Interbase 7.0
Borland Software Interbase 7.1
Borland Software Interbase 5.0
Borland Software Interbase 6.0
7.2
CVSSv2
CVE-2002-1514
gds_lock_mgr in Borland InterBase allows local users to overwrite files and gain privileges via a symlink attack on a "isc_init1.X" temporary file, as demonstrated by modifying the xinetdbd file.
Borland Software Interbase 6.5
Borland Software Interbase 5.0
Borland Software Interbase 4.0
Borland Software Interbase 6.0
1 EDB exploit
5
CVSSv2
CVE-2004-2043
Buffer overflow in ibserver for Firebird Database 1.0 and other versions prior to 1.5, and possibly other products that use the InterBase codebase, allows remote malicious users to cause a denial of service (crash) via a long database name, as demonstrated using the gsec command.
Borland Software Interbase 5.0
Borland Software Interbase 6.0
Borland Software Interbase 4.0
Borland Software Interbase Superserver 6.0
Firebirdsql Firebird 1.0
Borland Software Interbase 6.4
Borland Software Interbase 6.5
Borland Software Interbase 7.0
Borland Software Interbase 7.1
2 EDB exploits
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
firmware
CVE-2006-4304
CVE-2024-32878
CVE-2024-31502
XSS
CVE-2024-3059
CVE-2024-33692
CVE-2024-3400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started