Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.7 vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2010-3731
Stack-based buffer overflow in the validateUser implementation in the com.ibm.db2.das.core.DasSysCmd function in db2dasrrm in the DB2 Administration Server (DAS) component in IBM DB2 9.1 before FP10, 9.5 before FP6a, and 9.7 before FP3 allows remote malicious users to execute arb...
Ibm Db2 9.5
890
VMScore
CVE-2010-3193
Unspecified vulnerability in the DB2STST program in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 has unknown impact and attack vectors.
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
756
VMScore
CVE-2014-3094
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.4
Ibm Db2 9.8.0.4
Ibm Db2 9.8.0.5
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.6
Ibm Db2 9.8
Ibm Db2 9.8.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.5.0.1
Ibm Db2 10.5
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.1.0.2
756
VMScore
CVE-2013-6744
The Stored Procedure infrastructure in IBM DB2 9.5, 9.7 before FP9a, 10.1 before FP3a, and 10.5 before FP3a on Windows allows remote authenticated users to gain privileges by leveraging the CONNECT privilege and the CREATE_EXTERNAL_ROUTINE authority.
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.7
Ibm Db2 9.5
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.1
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.1
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.5
Ibm Db2 10.1.0.3
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.5
756
VMScore
CVE-2012-4826
Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stored procedure.
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.3
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.1
712
VMScore
CVE-2015-1935
The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote malicious users to cause a denial of service or execute arbitrary code via unspecified vectors.
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.8
668
VMScore
CVE-2012-0711
Integer signedness error in the db2dasrrm process in the DB2 Administration Server (DAS) in IBM DB2 9.1 through FP11, 9.5 before FP9, and 9.7 through FP5 on UNIX platforms allows remote malicious users to execute arbitrary code via a crafted request that triggers a heap-based buf...
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
668
VMScore
CVE-2011-0731
Buffer overflow in the DB2 Administration Server (DAS) component in IBM DB2 9.1 before FP10, 9.5 before FP7, and 9.7 before FP3 on Linux, UNIX, and Windows allows remote malicious users to execute arbitrary code via unspecified vectors.
Ibm Db2 9.1
Ibm Db2
Ibm Db2 9.5
Ibm Db2 9.7
668
VMScore
CVE-2010-3194
The DB2DART program in IBM DB2 9.1 before FP9, 9.5 before FP6, and 9.7 before FP2 allows malicious users to bypass intended file access restrictions via unspecified vectors related to overwriting files owned by an instance owner.
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
668
VMScore
CVE-2009-3471
IBM DB2 8 before FP18, 9.1 before FP8, 9.5 before FP4, and 9.7 before FP2 does not perform the expected drops of certain table functions upon a loss of privileges by the functions' definers, which has unspecified impact and remote attack vectors.
Ibm Db2 8.0
Ibm Db2 9.1
Ibm Db2 9.5
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4946
CVE-2024-30309
CVE-2024-4761
CVE-2024-30051
type confusion
memory leak
CVE-2024-30293
reflected XSS
CVE-2024-3126
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »