Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.8 vulnerabilities and exploits
(subscribe to this query)
4
CVSSv2
CVE-2016-0215
IBM DB2 9.7, 10.1 before FP6, and 10.5 before FP8 on AIX, Linux, HP, Solaris and Windows allow remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with a subquery containing the AVG OLAP function on an Oracle compatible database.
Ibm Db2 10.5
Ibm Db2 10.1
Ibm Db2 9.7
Ibm Db2 9.8
4
CVSSv2
CVE-2016-0211
IBM DB2 9.7 through FP11, 9.8, 10.1 through FP5, and 10.5 through FP7 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) via a crafted DRDA message.
Ibm Db2 Connect 9.8.0.1
Ibm Db2 Connect 9.8.0.5
Ibm Db2 Connect 9.8.0.3
Ibm Db2 Connect 9.8.0.2
Ibm Db2 9.8.0.3
Ibm Db2 9.8.0.2
Ibm Db2 9.8.0.1
Ibm Db2 9.8.0.4
Ibm Db2 9.8.0.5
Ibm Db2 9.8
Ibm Db2 Connect 9.8.0.4
Ibm Db2 Connect 9.8
Ibm Db2 Connect 10.5.0.7
Ibm Db2 Connect 10.5.0.6
Ibm Db2 Connect 10.5.0.5
Ibm Db2 Connect 10.5.0.4
Ibm Db2 10.5.0.7
Ibm Db2 10.5.0.6
Ibm Db2 10.5.0.5
Ibm Db2 10.5.0.4
Ibm Db2 10.5.0.3
Ibm Db2 10.5.0.2
3.5
CVSSv2
CVE-2015-1922
The Data Movement implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to bypass intended access restrictions and delete table rows via unspecified vectors.
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
8
CVSSv2
CVE-2015-1935
The scalar-function implementation in IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote malicious users to cause a denial of service or execute arbitrary code via unspecified vectors.
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.8
6.8
CVSSv2
CVE-2015-0157
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by leveraging an unspecified scalar function in a SQL statement.
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
4
CVSSv2
CVE-2015-1883
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read certain administrative files via crafted use of an automated-maintenance policy stored procedure.
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 9.7
Ibm Db2 10.5
4
CVSSv2
CVE-2014-8910
IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary text files via a crafted XML/XSLT function in a SELECT statement.
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
4
CVSSv2
CVE-2014-0919
IBM DB2 9.5 up to and including 10.5 on Linux, UNIX, and Windows stores passwords during the processing of certain SQL statements by the monitoring and audit facilities, which allows remote authenticated users to obtain sensitive information via commands associated with these fac...
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.5
4
CVSSv2
CVE-2014-8901
IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 allows remote authenticated users to cause a denial of service (CPU consumption) via a crafted XML query.
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.5
Ibm Db2 9.7
4
CVSSv2
CVE-2014-6209
IBM DB2 9.5 through FP10, 9.7 through FP10, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP5 on Linux, UNIX, and Windows allows remote authenticated users to cause a denial of service (daemon crash) by specifying an identity column within a crafted ALTER TABLE statement.
Ibm Db2 9.7
Ibm Db2 10.1
Ibm Db2 10.5
Ibm Db2 9.5
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »