296,334
Total vulnerabilities in the database
solid.exe in IBM solidDB before 4.5.181, 6.0.x before 6.0.1067, 6.1.x and 6.3.x before 6.3.47, and 6.5.x before 6.5.0.3 uses a password-hash length specified by the client, which allows remote attackers to bypass authentication via a short length value.
Software | From | Fixed in |
---|---|---|
ibm / soliddb | 4.5.175 | 4.5.175.x |
ibm / soliddb | 4.5.178 | 4.5.178.x |
ibm / soliddb | 4.5.176 | 4.5.176.x |
ibm / soliddb | - | 4.5.180.x |
ibm / soliddb | 4.5.179 | 4.5.179.x |
ibm / soliddb | 4.5.167 | 4.5.167.x |
ibm / soliddb | 4.5.173 | 4.5.173.x |
ibm / soliddb | 4.5.169 | 4.5.169.x |
ibm / soliddb | 4.5.168 | 4.5.168.x |
ibm / soliddb | 6.1 | 6.1.x |
ibm / soliddb | 6.0.1061 | 6.0.1061.x |
ibm / soliddb | 6.0.1060 | 6.0.1060.x |
ibm / soliddb | 6.30.0040 | 6.30.0040.x |
ibm / soliddb | 6.1.18 | 6.1.18.x |
ibm / soliddb | 6.3.33 | 6.3.33.x |
ibm / soliddb | 6.30.0039 | 6.30.0039.x |
ibm / soliddb | 6.0.1064 | 6.0.1064.x |
ibm / soliddb | 6.5.0.1 | 6.5.0.1.x |
ibm / soliddb | 6.1.20 | 6.1.20.x |
ibm / soliddb | 6.0.1066 | 6.0.1066.x |
ibm / soliddb | 6.5.0.2 | 6.5.0.2.x |
ibm / soliddb | 6.3.37 | 6.3.37.x |
ibm / soliddb | 6.5.0.0 | 6.5.0.0.x |
ibm / soliddb | 6.0.1065 | 6.0.1065.x |
ibm / soliddb | 6.3.38 | 6.3.38.x |
ibm / soliddb | 6.30.0044 | 6.30.0044.x |