Total vulnerabilities in the database
Untrusted search path vulnerability in IBM InfoSphere BigInsights 3.0, 3.0.0.1, 3.0.0.2, and 4.0, when a DB2 database is used, allows local users to gain privileges via a Trojan horse library that is loaded by a setuid or setgid program.
Software | From | Fixed in |
---|---|---|
ibm / infosphere_biginsights | 3.0.0.2 | 3.0.0.2.x |
ibm / infosphere_biginsights | 3.0.0.0 | 3.0.0.0.x |
ibm / infosphere_biginsights | 3.0.0.1 | 3.0.0.1.x |
ibm / infosphere_biginsights | 4.0.0.0 | 4.0.0.0.x |