Progress Datadirect Odbc Oracle Wire Protocol Driver
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Progress Datadirect Odbc Oracle Wire Protocol Driver.
By the Year
In 2025 there have been 0 vulnerabilities in Progress Datadirect Odbc Oracle Wire Protocol Driver. Datadirect Odbc Oracle Wire Protocol Driver did not have any published security vulnerabilities last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2025 | 0 | 0.00 |
2024 | 0 | 0.00 |
2023 | 2 | 7.85 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Datadirect Odbc Oracle Wire Protocol Driver vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Progress Datadirect Odbc Oracle Wire Protocol Driver Security Vulnerabilities
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle
CVE-2023-34364
9.8 - Critical
- June 09, 2023
A buffer overflow was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. An overly large value for certain options of a connection string may overrun the buffer allocated to process the string value. This allows an attacker to execute code of their choice on an affected host by copying carefully selected data that will be executed as code.
Memory Corruption
An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle
CVE-2023-34363
5.9 - Medium
- June 09, 2023
An issue was discovered in Progress DataDirect Connect for ODBC before 08.02.2770 for Oracle. When using Oracle Advanced Security (OAS) encryption, if an error is encountered initializing the encryption object used to encrypt data, the code falls back to a different encryption mechanism that uses an insecure random number generator to generate the private key. It is possible for a well-placed attacker to predict the output of this random number generator, which could lead to an attacker decrypting traffic between the driver and the database server. The vulnerability does not exist if SSL / TLS encryption is used.
PRNG
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Oracle or by Progress? Click the Watch button to subscribe.