Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:7.31:*:*:*:*:*:*:*", "matchCriteriaId": "45A93A4B-8AB8-4BC7-9253-8DDA9D091C0A", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.tc5:*:*:*:*:*:*:*", "matchCriteriaId": "CE9B0C17-2D85-4729-85EF-2F5C750BF51B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc1:*:*:*:*:*:*:*", "matchCriteriaId": "910D9A17-43A7-4F9E-98E0-2C465AC8BD2F", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc2:*:*:*:*:*:*:*", "matchCriteriaId": "1E61711D-4C3E-4A6D-89A8-85B7CDD7FAE1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc3:*:*:*:*:*:*:*", "matchCriteriaId": "B2CD7B84-2861-4542-8A08-C668065C8DB4", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.uc5:*:*:*:*:*:*:*", "matchCriteriaId": "E64D85E2-AA7E-4704-A2FA-BD69744423CF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.xc5:*:*:*:*:*:*:*", "matchCriteriaId": "21FF7CE7-A061-425B-A29B-1EC6DEDA2C10", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:9.40.xc7:*:*:*:*:*:*:*", "matchCriteriaId": "AD626D2D-D1ED-4B44-A236-CF20F1708D98", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00:*:*:*:*:*:*:*", "matchCriteriaId": "E67D2B80-49E9-4DDA-87A3-D145B9F49D10", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.tc3tl:*:*:*:*:*:*:*", "matchCriteriaId": "DD6DB2FB-517B-4450-8559-0EE38A82974D", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc1:*:*:*:*:*:*:*", "matchCriteriaId": "257DA554-937D-4BA1-9131-2F978C6E5E62", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc2:*:*:*:*:*:*:*", "matchCriteriaId": "A81C5A16-B696-4A8D-AFD2-1A51B3BE4EDB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc3:*:*:*:*:*:*:*", "matchCriteriaId": "48562C58-0055-4394-9B40-D5730FE6A8AF", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc4:*:*:*:*:*:*:*", "matchCriteriaId": "45791C63-A04C-4990-A78D-0529C8E9CC3E", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc5:*:*:*:*:*:*:*", "matchCriteriaId": "55991F0F-2770-4367-9850-93504D33580C", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc6:*:*:*:*:*:*:*", "matchCriteriaId": "7F9C4B48-B294-4BAF-99EE-7D2E1B024BFD", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc7w1:*:*:*:*:*:*:*", "matchCriteriaId": "1061A1A7-579D-4222-A31D-F34F8A11EA63", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc8:*:*:*:*:*:*:*", "matchCriteriaId": "461C0E60-9EB5-42EA-835C-B1F5234E8CF1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc9:*:*:*:*:*:*:*", "matchCriteriaId": "69DB33A6-1D6E-476A-97E4-8EE60EA43127", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:10.00.xc10:*:*:*:*:*:*:*", "matchCriteriaId": "809EB926-BCB1-4EEF-B385-5C487B1F8301", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "F3398187-9A9C-4584-A186-01DB36C88219", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.10.tb4tl:*:*:*:*:*:*:*", "matchCriteriaId": "4B657EAB-6F3F-4123-8B03-FEB931A424B5", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc1:*:*:*:*:*:*:*", "matchCriteriaId": "BC21790C-D057-4B11-8D0C-202B71B1E7A4", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc1de:*:*:*:*:*:*:*", "matchCriteriaId": "1D7F320F-72E0-440C-A300-6D85AEE86DA9", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2:*:*:*:*:*:*:*", "matchCriteriaId": "539DE4E7-8531-43E8-AE75-178BFC4324F7", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.10.xc2e:*:*:*:*:*:*:*", "matchCriteriaId": "487A81FC-FBB9-43C6-B419-4BA033054CEB", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.50:*:*:*:*:*:*:*", "matchCriteriaId": "DE122FD4-9164-4638-8E98-7670908E392B", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc1:*:*:*:*:*:*:*", "matchCriteriaId": "E99EBE74-8437-4DFD-B44A-5BD06B708BA1", "vulnerable": true}, {"criteria": "cpe:2.3:a:ibm:informix_dynamic_server:11.50.xc2:*:*:*:*:*:*:*", "matchCriteriaId": "B1E504E6-5293-4255-9FDB-CB115A5719D0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in IBM Informix Dynamic Server (IDS) 7.x through 7.31, 9.x through 9.40, 10.00 before 10.00.xC10, 11.10 before 11.10.xC3, and 11.50 before 11.50.xC3 allows remote authenticated users to execute arbitrary code via long DBINFO keyword arguments in a SQL statement, aka idsdb00165017, idsdb00165019, idsdb00165021, idsdb00165022, and idsdb00165023."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en IBM Informix Dynamic Server (IDS) v7.x hasta la v7.31, 9.x hasta la v9.40, v10.00 anterior a v10.00.xC10, v11.10 anterior a v11.10.xC3, y v11.50 anterior a v11.50.xC3, permite a usuarios remotos autenticados ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un argumento clave DBINFO largo en una petici\u00f3n SQL, tambi\u00e9n conocido como idsdb00165017, idsdb00165019, idsdb00165021, idsdb00165022 y idsdb00165023.\r\n"}], "id": "CVE-2010-4069", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2010-10-25T20:01:06.283", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/41914"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/68707"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2010/2735"}, {"source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-217/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/41914"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/68707"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2010/2735"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-10-217/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-119"}], "source": "nvd@nist.gov", "type": "Primary"}]}