Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ibm db2 9.7 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2012-2180
The chaining functionality in the Distributed Relational Database Architecture (DRDA) module in IBM DB2 9.7 before FP6 and 9.8 before FP5 allows remote malicious users to cause a denial of service (NULL pointer dereference, and resource consumption or daemon crash) via a crafted ...
Ibm Db2 9.7.0.5
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.4
Ibm Db2 9.8
Ibm Db2 9.8.0.3
Ibm Db2 9.8.0.4
8.5
CVSSv2
CVE-2012-4826
Stack-based buffer overflow in the SQL/PSM (aka SQL Persistent Stored Module) Stored Procedure (SP) infrastructure in IBM DB2 9.1, 9.5, 9.7 before FP7, 9.8, and 10.1 might allow remote authenticated users to execute arbitrary code by debugging a stored procedure.
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.3
Ibm Db2 9.1
Ibm Db2 9.5
Ibm Db2 9.7
Ibm Db2 9.8
Ibm Db2 10.1
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.1
6.9
CVSSv2
CVE-2011-4061
Multiple untrusted search path vulnerabilities in (1) db2rspgn and (2) kbbacf1 in IBM DB2 Express Edition 9.7, as used in the IBM Tivoli Monitoring for Databases: DB2 Agent, allow local users to gain privileges via a Trojan horse libkbb.so in the current working directory, relate...
Ibm Db2 9.7
Ibm Tivoli Monitoring For Databases
8.5
CVSSv2
CVE-2013-6744
The Stored Procedure infrastructure in IBM DB2 9.5, 9.7 before FP9a, 10.1 before FP3a, and 10.5 before FP3a on Windows allows remote authenticated users to gain privileges by leveraging the CONNECT privilege and the CREATE_EXTERNAL_ROUTINE authority.
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.7
Ibm Db2 9.5
Ibm Db2 10.1.0.2
Ibm Db2 10.1.0.1
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.1
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.5
Ibm Db2 10.1.0.3
Ibm Db2 9.7.0.6
Ibm Db2 9.7.0.5
7.2
CVSSv2
CVE-2014-0907
Multiple untrusted search path vulnerabilities in unspecified (1) setuid and (2) setgid programs in IBM DB2 9.5, 9.7 before FP9a, 9.8, 10.1 before FP3a, and 10.5 before FP3a on Linux and UNIX allow local users to gain root privileges via a Trojan horse library.
Ibm Db2 10.1.0.3
Ibm Db2 10.1.0.2
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.1.0.1
Ibm Db2 10.1
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.1
Ibm Db2 10.5
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.6
Ibm Db2 9.5
8.5
CVSSv2
CVE-2014-3094
Stack-based buffer overflow in IBM DB2 9.7 through FP9a, 9.8 through FP5, 10.1 through FP4, and 10.5 before FP4 on Linux, UNIX, and Windows allows remote authenticated users to execute arbitrary code via a crafted ALTER MODULE statement.
Ibm Db2 9.7.0.5
Ibm Db2 9.7.0.4
Ibm Db2 9.8.0.4
Ibm Db2 9.8.0.5
Ibm Db2 10.5.0.2
Ibm Db2 10.5.0.3
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.3
Ibm Db2 9.7.0.2
Ibm Db2 10.1
Ibm Db2 10.1.0.1
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.6
Ibm Db2 9.8
Ibm Db2 9.8.0.3
Ibm Db2 10.1.0.4
Ibm Db2 10.5.0.1
Ibm Db2 10.5
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.1
Ibm Db2 9.7
Ibm Db2 10.1.0.2
4
CVSSv2
CVE-2013-6717
The OLAP query engine in IBM DB2 and DB2 Connect 9.7 through FP9, 9.8 through FP5, 10.1 through FP3, and 10.5 through FP2, and the DB2 pureScale Feature 9.8 for Enterprise Server Edition, allows remote authenticated users to cause a denial of service (database outage and deactiva...
Ibm Db2 Connect 9.7
Ibm Db2 Connect 9.7.0.7
Ibm Db2 Connect 9.7.0.8
Ibm Db2 9.7.0.2
Ibm Db2 9.7.0.3
Ibm Db2 Connect 9.7.0.3
Ibm Db2 Connect 9.7.0.4
Ibm Db2 9.7.0.8
Ibm Db2 9.7.0.9
Ibm Db2 9.7.0.6
Ibm Db2 Connect 9.7.0.1
Ibm Db2 Connect 9.7.0.2
Ibm Db2 Connect 9.7.0.9
Ibm Db2 9.7.0.7
Ibm Db2 9.7.0.4
Ibm Db2 9.7.0.5
Ibm Db2 Connect 9.7.0.5
Ibm Db2 Connect 9.7.0.6
Ibm Db2 9.7
Ibm Db2 9.7.0.1
Ibm Db2 Connect 9.8
Ibm Db2 9.8
5
CVSSv2
CVE-2012-2194
Directory traversal vulnerability in the SQLJ.DB2_INSTALL_JAR stored procedure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote malicious users to replace JAR files via unspecified vectors.
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.7
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.6
Ibm Db2 9.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.11
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.4
Ibm Db2 9.5.0.5
5
CVSSv2
CVE-2012-2196
IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote malicious users to read arbitrary XML files via the (1) GET_WRAP_CFG_C or (2) GET_WRAP_CFG_C2 stored procedure.
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.6
Ibm Db2 9.1.0.7
Ibm Db2 9.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.11
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.4
Ibm Db2 9.5.0.5
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
7.1
CVSSv2
CVE-2012-2197
Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges.
Ibm Db2 9.1
Ibm Db2 9.1.0.1
Ibm Db2 9.1.0.5
Ibm Db2 9.1.0.6
Ibm Db2 9.1.0.11
Ibm Db2 9.1.0.2
Ibm Db2 9.1.0.7
Ibm Db2 9.1.0.3
Ibm Db2 9.1.0.8
Ibm Db2 9.1.0.4
Ibm Db2 9.1.0.9
Ibm Db2 9.1.0.10
Ibm Db2 9.5.0.4
Ibm Db2 9.5
Ibm Db2 9.5.0.1
Ibm Db2 9.5.0.2
Ibm Db2 9.5.0.5
Ibm Db2 9.5.0.6
Ibm Db2 9.5.0.3
Ibm Db2 9.5.0.7
Ibm Db2 9.5.0.8
Ibm Db2 9.5.0.9
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »