{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T14:54:19.742","vulnerabilities":[{"cve":{"id":"CVE-2023-27869","sourceIdentifier":"psirt@us.ibm.com","published":"2023-07-10T16:15:50.187","lastModified":"2024-11-21T07:53:36.557","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Db2 JDBC Driver for Db2 for Linux, UNIX and Windows 10.5, 11.1, and 11.5 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unchecked logger injection. By sending a specially crafted request using the named traceFile property, an attacker could exploit this vulnerability to execute arbitrary code on the system.  IBM X-Force ID:  249517."}],"metrics":{"cvssMetricV31":[{"source":"psirt@us.ibm.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"psirt@us.ibm.com","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:10.5.0.11:*:*:*:*:*:*:*","matchCriteriaId":"522925FD-12E1-4F2A-9036-58B630EBBA09"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.1.4.7:*:*:*:*:*:*:*","matchCriteriaId":"112E9B7F-FA07-4B44-9EAE-2CB1121EA33F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:db2:11.5:*:*:*:*:-:*:*","matchCriteriaId":"2788AA73-3346-4454-948E-9C1556DDDEBA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*","matchCriteriaId":"F480AA32-841A-4E68-9343-B2E7548B0A0C"},{"vulnerable":false,"criteria":"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*","matchCriteriaId":"E492C463-D76E-49B7-A4D4-3B499E422D89"},{"vulnerable":false,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"},{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"},{"vulnerable":false,"criteria":"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*","matchCriteriaId":"91F372EA-3A78-4703-A457-751B2C98D796"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/249517","source":"psirt@us.ibm.com","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20230803-0006/","source":"psirt@us.ibm.com"},{"url":"https://www.ibm.com/support/pages/node/7010029","source":"psirt@us.ibm.com","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/249517","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]},{"url":"https://security.netapp.com/advisory/ntap-20230803-0006/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.ibm.com/support/pages/node/7010029","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}