Datadirect Odbc Oracle Wire Protocol Driver Progress Datadirect Odbc Oracle Wire Protocol Driver

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Progress Datadirect Odbc Oracle Wire Protocol Driver.

By the Year

In 2025 there have been 0 vulnerabilities in Progress Datadirect Odbc Oracle Wire Protocol Driver. Datadirect Odbc Oracle Wire Protocol Driver did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 2 7.85
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Datadirect Odbc Oracle Wire Protocol Driver vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Progress Datadirect Odbc Oracle Wire Protocol Driver Security Vulnerabilities

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle

CVE-2023-34364 9.8 - Critical - June 09, 2023

A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.

Memory Corruption

An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle

CVE-2023-34363 5.9 - Medium - June 09, 2023

An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. When using Oracle Advanced Security (OAS) encryption, if an error is encountered initializing the encryption object used to encrypt data, the code falls back to a different encryption mechanism that uses an insecure random number generator to generate the private key. It is possible for a well-placed attacker to predict the output of this random number generator, which could lead to an attacker decrypting traffic between the driver and the database server. The vulnerability does not exist if SSL / TLS encryption is used.

PRNG

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Oracle or by Progress? Click the Watch button to subscribe.

Progress
Vendor

subscribe