cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-4606,https://securityvulnerability.io/vulnerability/CVE-2019-4606,,"IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 168298.",IBM,"Db2 High Performance Unload Load For Luw,Db2 High Performance Unload Load For Luw",7.4,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2019-12-12T17:15:00.000Z,0 CVE-2019-4523,https://securityvulnerability.io/vulnerability/CVE-2019-4523,,"IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 is vulnerable to a buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with root privileges. IBM X-Force ID: 165481.",IBM,"Db2 High Performance Unload Load For Luw,Db2 High Performance Unload Load For Luw",8.4,HIGH,0.0004199999966658652,false,,false,false,false,,,false,false,,2019-10-22T15:15:00.000Z,0 CVE-2019-4447,https://securityvulnerability.io/vulnerability/CVE-2019-4447,,"IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum_debug is a setuid root binary which trusts the PATH environment variable. A low privileged user can execute arbitrary commands as root by altering the PATH variable to point to a user controlled location. When a crash is induced the trojan gdb command is executed. IBM X-Force ID: 163488.",IBM,Db2 High Performance Unload Load For Luw,8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-08-26T15:15:00.000Z,0 CVE-2019-4448,https://securityvulnerability.io/vulnerability/CVE-2019-4448,,"IBM DB2 High Performance Unload load for LUW 6.1, 6.1.0.1, 6.1.0.1 IF1, 6.1.0.2, 6.1.0.2 IF1, and 6.1.0.1 IF2 db2hpum and db2hpum_debug binaries are setuid root and have built-in options that allow an low privileged user the ability to load arbitrary db2 libraries from a privileged context. This results in arbitrary code being executed with root authority. IBM X-Force ID: 163489.",IBM,Db2 High Performance Unload Load For Luw,8.4,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2019-08-26T15:15:00.000Z,0